1
0
mirror of https://git.yoctoproject.org/meta-ti synced 2026-01-12 01:20:20 +00:00

Compare commits

...

344 Commits

Author SHA1 Message Date
Ryan Eatmon
73dd142262 trusted-firmware-a: Remove rwx patch
Upstream meta-arm has picked up support for what this patch was doing,
it can be removed.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-07-22 19:40:02 -05:00
Andrew Davis
b8fb4a6ab5 conf: machine: am65xx: Remove SYSFW_SUFFIX from non-k3r5 configs
This definition is only needed in the "-k3r5" multiconfig files.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-07-21 10:43:28 -05:00
Andrew Davis
4be6466ef8 conf: Remove old and no longer used MACHINE_FEATURES
The following MACHINE_FEATURES are not matched against anywhere, remove:
 * kernel26
 * ethernet
 * mmc

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-07-21 10:43:28 -05:00
Andrew Davis
2288d6622b conf: Remove leftover UIO Device Tree overlay files
We do not use UIO anymore, remove these files.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-07-21 10:43:28 -05:00
Kamlesh Gurudasani
055541af09 trusted-firmware-a: Update to v2.9 release tag
Update to latest release tag, i.e. v2.9

https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/commit/?id=d3e71ead6ea5bc3555ac90a446efec84ef6c6122

Signed-off-by: Kamlesh Gurudasani <kamlesh@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-07-21 10:43:28 -05:00
LCPD Automation Script
2f99de0e39 linux-ti-staging_6.1: CI/CD Auto-Merger: cicd.master.202307210100
Updated the value(s) for:
  PV
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-07-21 01:02:27 -05:00
LCPD Automation Script
1190ce114e linux-ti-staging-rt_6.1: CI/CD Auto-Merger: cicd.master.202307210100
Updated the value(s) for:
  PV
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-07-21 01:02:27 -05:00
LCPD Automation Script
1121209714 k3conf: CI/CD Auto-Merger: cicd.master.202307210100
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-07-21 01:02:27 -05:00
LCPD Automation Script
70030a60cc u-boot-ti-staging_2023.04: CI/CD Auto-Merger: cicd.master.202307210100
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-07-21 01:02:27 -05:00
Praneeth Bajjuri
a656575ecd meta-ti: conf: am62xx-lp-evm: Use common include am62xx.inc
commit 5f9be22839 ("machine: Add AM62Q HS-SE evm configuration")
has added am62xx-lp.inc which is used by am62xx-lp-evm machine.

The features listed in am62xx.inc are common between machines
am62xx-evm and am62xx-lp-evm. (Ex: MACHINE_FEATURES = "gpu")

Hence updating the necessary include file to have
common features to be enabled between these two platform variants.

Signed-off-by: Praneeth Bajjuri <praneeth@ti.com>
Suggested-by: Randolph Sapp <rs@ti.com>
Reviewed-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-07-18 08:23:52 -05:00
LCPD Automation Script
660a693785 linux-ti-staging_6.1: CI/CD Auto-Merger: cicd.master.202307180100
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-07-18 01:03:06 -05:00
LCPD Automation Script
ea4a474e32 linux-ti-staging-rt_6.1: CI/CD Auto-Merger: cicd.master.202307180100
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-07-18 01:03:06 -05:00
LCPD Automation Script
c13289b1a5 u-boot-ti-staging_2023.04: CI/CD Auto-Merger: cicd.master.202307180100
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-07-18 01:03:06 -05:00
Randolph Sapp
a2c3fd8668 ti-img-rogue-*: bump srcrev for jacinto fixes
Bump the SRCREV for the umlibs and driver package to include some fixes
for Jacinto devices. These patches do the following:
 - Fix virtual memory addressing
 - Resolve an issue with APM and debug requests
 - Attempt to resolve most of the cache coherency related issues on
   Jacinto devices
 - Introduce some extra cache maintenance operations in the kernel
   module

It also introduces the following known issues:
 - Visual artifacting on the second-to-last EGL/GLES context on BXS
   based devices (J721S2/J784S4)

We're still working on that last one, but the stability improvements
make this worth while for now.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-07-11 12:56:58 -05:00
Andrew Davis
6b741edf5f conf: machine: k3: Use ARM64 kernel load address in FIT
The address 0x80008000 was used in pre-K3 devices. ARM64 requires the
kernel loaded to a 2MB aligned address when not using KASLR. For FIT
set the address to 0x81000000 which gives the kernel 32MB before running
into the FDT at 0x83000000.

If you get this error someday then your kernel is too large and either it
or FDT needs relocated in memory:
    ERROR: image is not a fdt - must RESET the board to recover.

Signed-off-by: Andrew Davis <afd@ti.com>
Tested-by: Praneeth Bajjuri <praneeth@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-07-07 08:45:10 -05:00
Praneeth Bajjuri
cc14f9eb41 pru-icss_git.bb: update to PSSP v6.2.0
Upgrade to v6.2.0 version.
This release supports Linux kernel 6.1.
The RPMsg library in previous versions of the PSSP will not work with
the PRU RPMsg drivers in Linux kernel 6.1.

Other changes in this version:
 * Bug fixes:
     - Getting Started Labs, fix "zero" command clearing too many bytes
     - Include files, add a missing parentheses to pru_cfg, pru_ctrl, pru_ecap
 * Update ReadMe files to point to the latest URLs

Signed-off-by: Praneeth Bajjuri <praneeth@ti.com>
Signed-off-by: Praneeth Bajjuri <praneeth@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-07-07 08:45:10 -05:00
Hari Nagalla
b644099752 ipc: ti-rpmsg-char: Update library to 0.6.2
Update ti-rpmsg-char library to fix wrong rpmsg-ctrl
device ids observed when multiple remote procs are present
with multiple channels opened.

Signed-off-by: Hari Nagalla <hnagalla@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-07-07 08:45:10 -05:00
LCPD Automation Script
35f8418759 linux-ti-staging_6.1: CI/CD Auto-Merger: cicd.master.202307070100
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-07-07 01:01:51 -05:00
LCPD Automation Script
87ac962bb6 linux-ti-staging-rt_6.1: CI/CD Auto-Merger: cicd.master.202307070100
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-07-07 01:01:51 -05:00
LCPD Automation Script
19417c46e2 u-boot-ti-staging_2023.04: CI/CD Auto-Merger: cicd.master.202307070100
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-07-07 01:01:51 -05:00
LCPD Automation Script
c012b56b94 ti-linux-fw: CI/CD Auto-Merger: cicd.master.202307070100
Updated the value(s) for:
  TI_LINUX_FW_SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-07-07 01:01:51 -05:00
Ryan Eatmon
a3fe9c4e2a conf: am335x-evm and am437x-evm: bump max_leb_cnt
New features added require another increase to max_leb_cnt.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-07-05 19:10:51 -05:00
LCPD Automation Script
ad01add7d2 linux-ti-staging_6.1: CI/CD Auto-Merger: cicd.master.202306300100
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-30 01:15:54 -05:00
LCPD Automation Script
3fb2ba034f linux-ti-staging-rt_6.1: CI/CD Auto-Merger: cicd.master.202306300100
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-30 01:15:54 -05:00
LCPD Automation Script
078a5eb653 u-boot-ti-staging_2023.04: CI/CD Auto-Merger: cicd.master.202306300100
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-30 01:15:53 -05:00
LCPD Automation Script
19773df34a ti-linux-fw: CI/CD Auto-Merger: cicd.master.202306300100
Updated the value(s) for:
  TI_LINUX_FW_SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-30 01:15:53 -05:00
Aniket Limaye
877c9b62a2 conf: machine: j7*: Update KERNERL_DEVICETREE_PREFIX to match latest filenames
1) The k3-fpdlink-* dtbs were missing.
2) k3-j7200-mcspi-loopback.dts -> k3-j7200-evm-mcspi-loopback.dtso

Signed-off-by: Aniket Limaye <a-limaye@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-29 08:33:47 -05:00
Randolph Sapp
f482051d3c ti-img-rogue-driver: drop unused patch
The following patch was dropped from the SRC_URI one of my previous
graphics overhaul patches:
0001-compiler-support-OpenEmbedded-nodistro-internal-aarc.patch

Actually remove it from the source tree now that upstream is carrying
the equivalent to help enable other tools.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-28 07:23:59 -05:00
Randolph Sapp
38bd40b803 ti-img-rogue-driver: update to catch more compilers
Upstream changed to not be so picky about compilers. Bump SRCREV so the
odd things using our recipes are happy again.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-26 16:33:36 -05:00
Randolph Sapp
c21c827638 ti-img-rogue-umlibs: absolute path for file globs
Edit the file paths so they point at files in the source directory
explicitly. For some reason shell glob were previously only respected by
some machines.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-26 16:33:36 -05:00
LCPD Automation Script
40844ca5f1 linux-ti-staging-rt_6.1: CI/CD Auto-Merger: cicd.master.202306260100
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-26 01:02:19 -05:00
LCPD Automation Script
8f52313cb7 u-boot-ti-staging_2023.04: CI/CD Auto-Merger: cicd.master.202306260100
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-26 01:02:19 -05:00
Udit Kumar
df928ff49c linux-ti-staging: add configuration for remoteproc/rpmsg IPC modules
* rpmsg_client_sample is a test module and should not be autoloaded
* Both k3_r5 and k3_dsp remoteproc modules depend on virtio_rpmsg_bus

Cc: Denys Dmytriyenko <denys@ti.com>
Cc: Ryan Eatmon <reatmon@ti.com>
Cc: Praneeth Bajjuri <praneeth@ti.com>
Cc: Apurva Nandan <a-nandan@ti.com>
Cc: Hari Nagalla <hnagalla@ti.com>
Signed-off-by: Udit Kumar <u-kumar1@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-23 13:13:56 -05:00
Randolph Sapp
8af0ba63d2 ti-img-rogue-umlibs: use rrecommends for components
Use RRECOMMENDS for components. Apparently I made an resolvable
dependency cycle that Yocto silently clipped. My best guess at the
culprit was: mesa-megadriver (RR) -> rogue-km (RR) -> rogue-um (RD) ->
libgles1-rogue (RD) -> mesa-megadriver

That killed the ti-img-rogue-umlibs recipe during do_rootfs. The rogue
GLES libs do depend on mesa-megadriver at runtime but I guess the UM
components should only really recommend the rogue GLES components be
present at runtime to make the cycle resolvable by opkg.

Fixes:
1705f6d3 (ti-img-rogue-umlibs: make all components optional, 2023-06-21)

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-23 13:13:56 -05:00
Ravi Gunasekaran
fbc7a67449 prusw-fw: SR2.0: Package switch firmware for AM64
Now that driver support is added to support switch mode
for AM64, update recipes to package the switch firmware.

Signed-off-by: Ravi Gunasekaran <r-gunasekaran@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-23 13:13:56 -05:00
Ryan Eatmon
c70c1b611a pruhsr-fw: SR2.0: Add new firmware
We need to package up new HSR firmware for am65x-sr2.  Add dependencies
for them on the correct platforms.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Ravi Gunasekaran <r-gunasekaran@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-23 13:13:56 -05:00
Manorit Chawdhry
bde91baf8a conf: machine: include: k3 enable fit signing for uboot
Enables FIT Image signing for K3 platforms

Signed-off-by: Manorit Chawdhry <m-chawdhry@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-23 13:13:56 -05:00
Randolph Sapp
09c2c7597f ti-img-rogue-umlibs: make all components optional
Bumping into the limitations of the binary_package class. This change
allows all rogue components to be optionally packaged without blowing
out the dependency chain.

Add a python function to fetch file paths from the FILE vars for each
component so we don't end up double tracking files. Add variables to
track component packages if things split up more later. Add a package
config string to set runtime dependencies and recommendations. Change
all logic to revolve around the PACKAGECONFIG instead of distro
features.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-23 13:13:56 -05:00
LCPD Automation Script
907ffe2102 linux-ti-staging_6.1: CI/CD Auto-Merger: cicd.master.202306230100
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-23 01:01:33 -05:00
LCPD Automation Script
b8cc20bd11 linux-ti-staging-rt_6.1: CI/CD Auto-Merger: cicd.master.202306230100
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-23 01:01:33 -05:00
LCPD Automation Script
4ae979e628 u-boot-ti-staging_2023.04: CI/CD Auto-Merger: cicd.master.202306230100
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-23 01:01:33 -05:00
LCPD Automation Script
2f0f92dbd0 linux-ti-staging_6.1: CI/CD Auto-Merger: cicd.master.202306220100
Updated the value(s) for:
  PV
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-22 01:01:45 -05:00
LCPD Automation Script
8a493fcf78 linux-ti-staging-rt_6.1: CI/CD Auto-Merger: cicd.master.202306220100
Updated the value(s) for:
  PV
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-22 01:01:45 -05:00
LCPD Automation Script
e35b828f7a u-boot-ti-staging_2023.04: CI/CD Auto-Merger: cicd.master.202306220100
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-22 01:01:45 -05:00
LCPD Automation Script
38ec351103 ti-linux-fw: CI/CD Auto-Merger: cicd.master.202306220100
Updated the value(s) for:
  TI_LINUX_FW_SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-22 01:01:45 -05:00
Ryan Eatmon
a79e28015f kernel-rdepends: Add ti-eth-fw as an RDEPENDS
When the ti-eth-fw recipe was split out from the ti-rtos-firmware recipe
we forgot to add it as a dependency.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-21 09:52:05 -05:00
Ryan Eatmon
3f51206480 conf: am335x-evm and am437x-evm: bump max_leb_cnt
New features added require another increase to max_leb_cnt.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-21 09:30:30 -05:00
Devarsh Thakkar
3f945cae72 conf: machine: am62xx: Add TI logo as image boot file
Add TI logo bitmap image as image boot file so that it gets
copied to boot partition and A53 SPL or U-boot proper
can load it and display during board bootup.

Signed-off-by: Devarsh Thakkar <devarsht@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-19 13:40:25 -05:00
Devarsh Thakkar
1fed958bfe u-boot-ti-staging_2023.04: Copy bitmap file to boot partition for AM62x
Early splash screen support for AM62x has been enabled in u-boot
and it requires bitmap tarball to be present in boot partition
as per the default environment settings done in u-boot [1].

Copy the ti logo bitmap tarball to boot partition of wic image in order
to enable out of box early display on AM62x.

[1] https://git.ti.com/cgit/ti-u-boot/ti-u-boot/tree/board/ti/am62x/am62x.env

Signed-off-by: Devarsh Thakkar <devarsht@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-19 13:40:25 -05:00
Andrew Davis
f2c401efc3 ti-sci-fw: Include the TIFS LPM stub with the rest of SYSFW
This firmware is shipped with the rest of ti-sysfw blobs, it shares
the same versions too and so should be simply bundled with the same.

This stub is also built into U-Boot and not loaded during kernel
runtime anymore, so remove the RDEPENDS in kernel.

Signed-off-by: Andrew Davis <afd@ti.com>
Reviewed-by: Praneeth Bajjuri <praneeth@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-19 13:40:25 -05:00
LCPD Automation Script
bc5a7c7a61 ti-k3-secdev: CI/CD Auto-Merger: cicd.master.202306190100
Updated the value(s) for:
  GIT_SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-19 01:02:42 -05:00
LCPD Automation Script
4edad9ff21 linux-ti-staging_6.1: CI/CD Auto-Merger: cicd.master.202306190100
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-19 01:02:42 -05:00
LCPD Automation Script
52f4cf633e linux-ti-staging-rt_6.1: CI/CD Auto-Merger: cicd.master.202306190100
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-19 01:02:42 -05:00
LCPD Automation Script
5268d392b6 u-boot-ti-staging_2023.04: CI/CD Auto-Merger: cicd.master.202306190100
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-19 01:02:42 -05:00
LCPD Automation Script
c684309b59 ti-linux-fw: CI/CD Auto-Merger: cicd.master.202306190100
Updated the value(s) for:
  TI_LINUX_FW_SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-19 01:02:42 -05:00
Paresh Bhagat
8269533988 ti-extras: Add support for extra kernel/u-boot features
There are some features that will either never be accepted into the
upstream kernel, or are not ready to be accepted.  ti-extras allows for
controlling the kernel and u-boot repos, breanches, and srcrevs to gain
access to those features via the TI_EXTRAS variable in the local.conf
file.

Initial support for TI_EXTRAS=tie-jailhouse is being added by this
patch.

Signed-off-by: Paresh Bhagat <p-bhagat@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Acked-by: Paresh Bhagat <p-bhagat@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-14 12:49:59 -05:00
Denys Dmytriyenko
4c5461c237 optee: local fix for stray CFG_MAP_EXT_DT_SECURE=y in meta-arm
Latest update in meta-arm added unconditional CFG_MAP_EXT_DT_SECURE=y
that affects all platforms, but was only needed for qemu. And it also
depends on CFG_DT=y, which is platform-specific. The fix was submitted
upstream[0], overlay it locally until upstream resolves it.

[0] https://patchwork.yoctoproject.org/project/arm/patch/20230613181723.1711212-1-denis@denix.org/

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-14 10:01:45 -05:00
Denys Dmytriyenko
a0ce9c392f binutils: apply local fix for packaging of gprofng static library
The fix was submitted upstream to OE-Core[0], but due to other issues,
it is currently sitting in a backlog queue. Apply it locally for now.

[0] https://patchwork.yoctoproject.org/project/oe-core/patch/20230609235726.3119540-1-denis@denix.org/

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-14 10:01:45 -05:00
LCPD Automation Script
ab46744ef3 u-boot-ti-staging_2023.04: CI/CD Auto-Merger: cicd.master.202306120100
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-12 01:01:55 -05:00
Ryan Eatmon
68ab34dcf4 conf: am335x-evm and am437x-evm: bump max_leb_cnt
New features added require an increase to max_leb_cnt.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-10 20:12:54 -05:00
Randolph Sapp
ffcf419a28 ti-img-rogue-umlibs: drop the api specific dev packages
Well, flew a bit too close to the sun on that last patch. Apparently
there are a few hidden runtime dependencies on the API devlinks that
make things like EGL upset when they aren't present.

We may circle back to this at some point but for now we're fine shipping
the devlinks in the base API packages as these links don't step on any
other package.

Fixes: 1899f5ea (ti-img-rogue-umlibs: bump version and explicitly
package, 2023-06-01)

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-09 08:06:52 -05:00
LCPD Automation Script
803a9256d6 linux-ti-staging_6.1: CI/CD Auto-Merger: cicd.master.202306090100
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-09 01:02:39 -05:00
LCPD Automation Script
a45aa613a9 linux-ti-staging-rt_6.1: CI/CD Auto-Merger: cicd.master.202306090100
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-09 01:02:39 -05:00
LCPD Automation Script
754fa8bfd2 u-boot-ti-staging_2023.04: CI/CD Auto-Merger: cicd.master.202306090100
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-09 01:02:39 -05:00
LCPD Automation Script
408d1c0bc9 ti-linux-fw: CI/CD Auto-Merger: cicd.master.202306090100
Updated the value(s) for:
  TI_LINUX_FW_SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-09 01:02:39 -05:00
Bryan Brattlof
c0d9cb1970 ti-kernel: Apply RT fragments to RT kernel config
Apply the ti_rt.config fragment to all the linux-ti-staging-rt-6.1
defconfigs so we can properly build the RT kernel for our devices.

Signed-off-by: Bryan Brattlof <bb@ti.com>
Acked-by: Praneeth Bajjuri <praneeth@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-08 14:42:26 -05:00
LCPD Automation Script
1b0f195031 linux-ti-staging_6.1: CI/CD Auto-Merger: cicd.master.202306071118
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-07 11:19:39 -05:00
LCPD Automation Script
e6dfd8d975 linux-ti-staging-rt_6.1: CI/CD Auto-Merger: cicd.master.202306071118
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-07 11:19:39 -05:00
LCPD Automation Script
06782cbe59 u-boot-ti-staging_2023.04: CI/CD Auto-Merger: cicd.master.202306071118
Updated the value(s) for:
  SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-07 11:19:39 -05:00
LCPD Automation Script
f219978224 ti-linux-fw: CI/CD Auto-Merger: cicd.master.202306071118
Updated the value(s) for:
  TI_LINUX_FW_SRCREV

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
2023-06-07 11:19:39 -05:00
Andrew Davis
29051c0e20 conf: machine: am65xx: Update GP to SR2 firmware
SR2.0 firmware binaries should be used here as SR1.0 has been descoped.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-07 10:13:29 -05:00
Andrew Davis
54fc7cef41 conf: machine: am62xx-lp: Default to HS-FS instead of GP
This matches how we had the symlink for tiboot3.bin before binman.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-07 10:13:00 -05:00
Andrew Davis
e201cb74e9 conf: machine: am62xx: Default to HS-FS instead of GP
This matches how we had the symlink for tiboot3.bin before binman.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-07 10:13:00 -05:00
Andrew Davis
c8193da595 ti-dm-fw: Do not make signed DM image the default for K3
U-Boot with binman will do the signing as these images are packaged.
Do not rename the DM image as the signed image.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-07 10:12:16 -05:00
Andrew Davis
c76f3d98c8 optee-os: Do not sign OPTEE OS image for K3
U-Boot with binman will do the signing as these images are packaged.
Remove signing steps here.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-07 10:12:16 -05:00
Andrew Davis
d669f362ef trusted-firmware-a: Do not sign TF-A image for K3
U-Boot with binman will do the signing as these images are packaged.
Remove signing steps here.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-07 10:12:16 -05:00
Andrew Davis
a9dab0a216 conf: machine: j721e: Also deploy full named tiboot3.bin files
The platforms with combined boot image have full names for tiboot3.bin
and to keep things consistent we can do the same here. Deploy these files.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-07 10:10:22 -05:00
Andrew Davis
cb41db9eef conf: machine: am65xx: Also deploy full named tiboot3.bin files
The platforms with combined boot image have full names for tiboot3.bin
and to keep things consistent we can do the same here. Deploy these files.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-07 10:10:22 -05:00
Andrew Davis
4bbb9446f7 conf: machine: Do not override SPL_BINARY on AM65x and J721e
In U-Boot the names of these files have been updated to match our
expected defaults. Remove these fixups.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-07 10:10:22 -05:00
Andrew Davis
2e9bca6470 conf: machine: am62xx: Remove old SPL_BINARY and UBOOT_BINARY overrides
The defaults set in am62xx.inc are correct now and these can be dropped.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-07 10:10:22 -05:00
Andrew Davis
5e75149926 conf: machine: j784s4: Include the non-HS config in the HS config
Everything is the same, so just include the non-HS config to set vars.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-07 10:10:22 -05:00
Andrew Davis
fb5cdc1631 conf: machine: j721s2: Include the non-HS config in the HS config
Everything is the same, so just include the non-HS config to set vars.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-07 10:10:22 -05:00
Andrew Davis
b0dbaf58a1 conf: machine: am65xx: Deploy SR2 version of SYSFW
The HS boards use the SR2 version of the silicon, ship that version
of the sysfw.itb image.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-07 10:10:22 -05:00
Andrew Davis
72e9b749c0 conf: machine: Remove leftover k3r5 SOC_FAMILY names
These are not used anymore and most have been removed, these look
to be leftovers, remove them.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-07 10:10:22 -05:00
Hari Nagalla
ace86cffee ipc: ti-rpmsg-char: Update library to 0.6.1
Update the ti-rpmsg-char library to 0.6.1 version to fix rpmsg_ctlr
id on v6.1 kernel when multiple channels are created.

Signed-off-by: Hari Nagalla <hnagalla@ti.com>
Reviewed-by: Praneeth Bajjuri <praneeth@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-07 10:09:57 -05:00
Andrew Davis
ec7aaf6df9 conf: machine: Remove all leftover config files
Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-07 10:08:55 -05:00
Andrew Davis
568e63b542 conf: machine: Switch all the machines over to U-Boot binman
Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-07 10:08:55 -05:00
Andrew Davis
e74b9a1746 u-boot-ti-staging: Use binman to package our firmware
Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-07 10:06:40 -05:00
Andrew Davis
835811cf85 ti-sci-fw: Drop k3-image-gen and only provide firmware
This converts ti-sci-fw into a standard firmware provider package. We do
not need to do anything additional here with that firmware as U-Boot now
does that for us with binman.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-07 10:05:03 -05:00
Andrew Davis
d7d207a4e0 u-boot-ti-staging: Remove version 2021.01
This will no longer build after we switch away from k3-image-gen. Remove
this version and make 2023.04 the default.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-07 10:03:46 -05:00
Andrew Davis
017bdbb286 u-boot-bb.org: Remove this recipe
This will no longer build after we switch away from k3-image-gen. Remove
this version until it can be rebased on the latest U-Boot with binman
support. For now switch current users of this over to u-boot-ti v2021.01.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-07 10:02:09 -05:00
Andrew Davis
b7e58ce15a ti-sci-fw: Remove source package recipe
K3-image-gen is going away and we don't do SRCIPK packages like this
anymore anyway. Remove this recipe.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-07 10:02:09 -05:00
Andrew Davis
91e5a1ca65 ti-eth-fw: Add recipe for TI Ethernet firmware
Split out the TI Ethernet firmware from ti-rtos-firmware.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-07 10:02:09 -05:00
Andrew Davis
b21d29d946 ti-dm-fw: Add recipe for TI DM firmware
Split out the TI DM firmware from ti-rtos-firmware.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-07 10:02:09 -05:00
Ryan Eatmon
f96430c0f3 ti-kernel: Apply vendored dtb flags
Set the variables needed to put the DTBs into the same vendored
directory structure as they are in the kernel.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-07 10:00:41 -05:00
Randolph Sapp
9af812fcd6 ti-img-rogue-umlibs: bump version and explicitly package
Bump the version and explicitly package all Khronos APIs separately.
This should be nice for those folks that want a headless opencl system
for tinkering and such.

This version includes experimental GEM support (for applications like
Chromium that like to poke at the render node) and a new Vulkan ICD
loader interface for better support with the Vulkan ICD loaders present
in Yocto.

This lifts a method from mesa used to force a common naming convention
for Vulkan, OpenCL, and OpenGLES libs to make things a little easier to
follow. Without it the target package names get scrambled based on the
shared object name.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-01 16:07:00 -05:00
Randolph Sapp
2734d0d290 libgles: rename subdir to powervr-umlibs
Move recipes to new subdir since we offer more than just libgles now.
Reusing the naming convention of the subdirectory used for the km
components for now.

Signed-off-by: Randolph Sapp <rs@ti.com>
Acked-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-06-01 16:07:00 -05:00
Kevin Hao
8fa9ec7dcd cnm-wave-fw: Fix old override syntax
Signed-off-by: Kevin Hao <kexin.hao@windriver.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-31 08:28:42 -05:00
Andrew Davis
39ac02d70f ti-xdctools: Fold include files into the one remaining user
There is only one user of these include files, expand the files inside
the one user and remove the includes.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-25 08:59:11 -05:00
Andrew Davis
bcffc44675 ti-paths: Remove extra paths and alphabetize
This file should be whittled away over time, remove currently unused
paths to help us take inventory of what remains.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-25 08:59:11 -05:00
Denys Dmytriyenko
31fa75797a optee: couple minor changes to match with kirkstone
Minor changes to match with Kirkstone for consistency.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-23 10:45:33 -05:00
Randolph Sapp
4cfad35643 meta-ti-bsp: ti-img-rogue-driver: cleanup apm and add hack
Cleanup the J* APM patch a little. Apparently I could have stood to read
the docs a little more. Found some better runtime pm functions and also
discovered something new about the power island definition.

Notes from upstream:
	- Add the CCB coherency HACK from DDK 1.15 to improve stability
	  on J* devices
	- Fix power island support on J* devices
	- Use better APM calls so user modification to power domains
	  don't cause the device to enter a bad state

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-19 08:34:30 -05:00
Praneeth Bajjuri
64ba6e40da ipc: ti-rpmsg-char: Update library to 0.6.0
Update the ti-rpmsg-char library to 0.6.0 version that enables the
support for 6.1 kernel.

Signed-off-by: Praneeth Bajjuri <praneeth@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-18 14:50:05 -05:00
Randolph Sapp
a556e14310 meta-ti-bsp: sdimage-2part-efi: rename to load variables
Rename the .wks to .wks.in so the EFI_PROVIDER variable is expanded
properly. We only ever set a soft recommendation for GRUB. If anyone
attempted to change that previously it was ignored (for more than just
the reason here, but that's out of my control).

Add a timeout for the bootloader menu. Currently setting it to 3
seconds.

Remove the read only flag on the rootfs. Not sure why that was there.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-18 14:50:05 -05:00
Jai Luthra
507ff12202 conf: machine: am62axx: Use generic fpdlink prefix
The FPDLink overlays are platform-agnostic, and have been renamed to
match that in the tiL6.1 kernel [1]. So use the generic k3-fpdlink
prefix to pick the overlays in the builds.

[1]: https://git.ti.com/cgit/ti-linux-kernel/ti-linux-kernel/tree/arch/arm64/boot/dts/ti/Makefile?id=13ef48e91#n62

Signed-off-by: Jai Luthra <j-luthra@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-18 14:50:05 -05:00
LCPD Automation Script
b2cf11414a various: Sync from kirkstone CICD
ti-linux-fw: CI/CD Auto-Merger: cicd.kirkstone.202305161900
linux-ti-staging-rt_6.1: CI/CD Auto-Merger: cicd.kirkstone.202305161900
linux-ti-staging_6.1: CI/CD Auto-Merger: cicd.kirkstone.202305161900
u-boot-ti-staging_2023.04: CI/CD Auto-Merger: cicd.kirkstone.202305170400

Signed-off-by: LCPD Automation Script <lcpdbld@list.ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-17 10:40:50 -05:00
Ryan Eatmon
8b88d74469 various: Remove DEFAULT_PREFERENCE
Now that are past the inital stages of our LTS migration, we can remove
the DEFAULT_PREFERENCE settings that prevented these recipes from being
the default.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-17 09:46:34 -05:00
LCPD Automation Script
739b24bf1e various: Intial LTS migration version
As part of the initial LTS migration, move to the latest commits for the
various repos.
- ti-linux-fw
- u-boot-ti-staging_2021.01
- u-boot-ti-staging_2023.04
- k3conf_git
- linux-ti-staging-rt_5.10
- linux-ti-staging-rt_6.1
- linux-ti-staging_5.10
- linux-ti-staging_6.1

Going forward all updates will come from the CICD flow.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-17 09:46:34 -05:00
Ryan Eatmon
6eb5ffb743 ti-sci-fw: Add SYSFW_SUFFIX to SYSFW_BINARY to match k3-image-gen
k3_image_gen added the suffix to the sysfw binary to differentiate
between GP and HS binaries.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-17 09:46:34 -05:00
Randolph Sapp
49c17fb277 ti-img-rogue-driver: enable bxs/8xe apm
Bump the src revision to enable the following features on Jacinto:
	- Active power managment
	- Power island control via firmware

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-17 09:46:34 -05:00
Ryan Eatmon
bf146d794d ti-ipc: Stop looking for rpmsg_rpc.h in the kernel
Stop looking for the rpmsg_rpc.h in the kernel.  While we are doing the
LTS migration for kirkstone, this file is not going to be in the kernel
for a bit.  This patch works in conjunction with a recipe change that
downloads the header and adds a -I to the CFLAGS to pick it up.  This
will be removed once the 6.1 kernel has been updated.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-17 09:46:34 -05:00
Manorit Chawdhry
5763b91942 j721e-hs-evm: Merge j721e defconfigs
uboot will now use a merged defconfig build so keep the defconfig same
for hs here

Signed-off-by: Manorit Chawdhry <m-chawdhry@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-17 09:46:34 -05:00
Udit Kumar
5607a7a7cc meta-ti-bsp: conf: machine: j721s2: Update def config
u-boot 2023.04 merged def configs for HS and GP EVM into one.
This patch updates config for J721S2 HS EVM for both A72 and R5.

Signed-off-by: Udit Kumar <u-kumar1@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-17 09:46:34 -05:00
Udit Kumar
0e5428549b meta-ti-bsp: conf: machine: j7200: Update def config
u-boot 2023.04 merged def configs for HS and GP EVM into one.
This patch updates config for J7200 HS EVM for both A72 and R5.

Signed-off-by: Udit Kumar <u-kumar1@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-17 09:46:34 -05:00
Khem Raj
4137bd9b30 linux-bb.org_git.bb: Fix build with gcc-13
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-15 08:40:21 -05:00
Ryan Eatmon
96c6006bb0 conf: machine: Add extra tiboot3.bin version that matches default
When creating the boot partition we copy all of the images for the
different board types (gp, hs-fs, hs-se), but one of those we consider
to be a default.  That default is not copied with the longer name, but
rather with the tiboot3.bin name.

The issue comes when someone wants to boot with a different bin file.
They need to copy the approriate longer named .bin file to tiboot3.bin.
But then the original name of what tiboot3.bin is lost unless the use
backs it up.

This patch just additionally copies that longer named bin file so that
anyone who wants to look at the boot partiion and decide to boot for a
different board can know which file to copy to tiboot3.bin and does not
need to worry about making a backup.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-11 15:06:17 -05:00
Denys Dmytriyenko
389f9a8b72 trusted-firmware-a: only activate customizations for TI platforms
Avoid inheriting ti-secdev class and adding unconditional dependency
on TI_SECURE_DEV_PKG and other variables, when meta-ti-bsp is in the
bblayers.conf stack, but not building for TI platforms. This solves
yocto-check-layer signature test for Yocto Project compliance.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-11 14:27:59 -05:00
Denys Dmytriyenko
55c90c0aae optee-os: only activate customizations for TI platforms
Avoid inheriting ti-secdev class and adding unconditional dependency
on TI_SECURE_DEV_PKG and other variables, when meta-ti-bsp is in the
bblayers.conf stack, but not building for TI platforms. This solves
yocto-check-layer signature test for Yocto Project compliance.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-11 14:27:59 -05:00
Denys Dmytriyenko
24e9324551 mesa-pvr: convert bbappend into standalone alternative provider
There are some unobvious issues with adding PVR support to Mesa
via a bbappend:

1. We need to mark mesa package as machine-specific, due to
differences in builds between SGX, Rogue and software-rendering

2. We also need to then mark mesa package as providing safe
ABIs (EGL/GLES/GBM) in order for all generic dependent packages
to not be treated as machine-specific, allowing their re-use
across different machines of the same architecture

But doing the above alters the upstream mesa package and changes
its signatures even when not building for TI platforms, which is
a Yocto Project compliance violation.

In order to resolve this issue, convert Mesa bbappend, that adds
PVR support, into its own standalone alternative provider, called
mesa-pvr and allow selecting it with PREFERRED_PROVIDER settings.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-11 14:19:01 -05:00
Ryan Eatmon
f3a081a6c2 conf: machine: j784s4: Add AM69 SK dtbs to KERNEL_DEVICETREE_PREFIX
Add in missing am69 based dtbs that were added in dunfell at the end of
the 8.6 release cycle.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-09 15:28:36 -05:00
Ryan Eatmon
a6e4dcafc2 conf: machine: j721s2: Add AM68 SK dtbs to KERNEL_DEVICETREE_PREFIX
Add in missing am68 based dtbs that were added in dunfell at the end of
the 8.6 release cycle.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-09 15:28:36 -05:00
Ryan Eatmon
917989fe75 conf: Sync KERNEL_DEVICETREE(_PREFIX) with upstream
Some of the settings for KERNEL_DEVICETREE_PREFIX were missed in the
first pass.  Additionally, some new dts files that were not present in
upstream are now there and can be updated in KERNEL_DEVICETREE.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-09 15:27:44 -05:00
Denys Dmytriyenko
f22ea63f66 linux-bb.org: also package DT overlays in separate dir
OE-Core recently added non-flat directory structure for device trees
and overlays packaging:
https://git.openembedded.org/openembedded-core/commit/?id=04ab57d20009d85eb566e83ae6fe1dcea4db7300

But it only packages 2 levels - top KERNEL_DTBDEST and one level down
for vendored device trees. But linux-bb.org installs own overlays in
"overlays" subdir of the "ti" vendor directory, making it the third
level. Add those overlays into the package as weel.

Cc: Randolph Sapp <rs@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-08 15:24:40 -05:00
Aradhya Bhatia
8cf2128085 meta-ti: conf: am62xx-lp-evm: Fix DT and DT prefixes
The DT name k3-am62-lp-sk.dts was adopted instead of k3-am62x-lp-sk.dts
because the community prefers avoiding the wildcard letter 'x'.[1]

Drop the letter 'x' from the strings in KERNEL_DEVICETREE_PREFIX and
KERNEL_DEVICETREE to accurately reflect the DT names.

Signed-off-by: Aradhya Bhatia <a-bhatia1@ti.com>

[1]:
https://lore.kernel.org/all/06cbcd7d-bc83-bfeb-0821-72c7caf9a5e7@linaro.org/

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-08 15:23:35 -05:00
Paresh Bhagat
31eb1aa2b7 recipes-ti: Add recipe and patches for jailhouse support for am62xx
Add and enable Jailhouse support for TI's k3-am625-sk similarly to how other
TI platforms were added and enabled in the past by adding platform-specific
configuration variables for the root cell DTB overlay, and the Linux demo inmate
DTB, configuration, and Kernel command line settings.

Migrate the jailhouse recipe to kirkstone from dunfell.

Switch to latest upstream source tree for jailhouse. The TI Jailhouse repo has
gone stale and now upstream is really the happening place where new development
happens including for new devices such as AM62x. Hence go ahead and switch to
using the upstream repo.

Update the platform-specific config files to such that the root cell DTB overlay
gets included in the file system images.

Enable additional console on ttyS3 (usually mapped to main_uart1) and ttyS2 for
the Linux demo inmate to use.

Add patches for the Jailhouse source tree for am62xx.

Signed-off-by: Andreas Dannenberg <dannenberg@ti.com>
Signed-off-by: Ricardo Salveti <ricardo@foundries.io>
Signed-off-by: Paresh Bhagat <p-bhagat@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-08 11:17:40 -05:00
Daniel Schultz
d3c2c6e809 recipes-graphics: ti-img-rogue-umlibs: Make -vulkan optional
Only include the ti-img-rogue-umlibs-vulkan package if the
DISTRO_FEATURES x11 is enabled. Right now, this recipe has a failed
build dependency on images without x11.

Signed-off-by: Daniel Schultz <d.schultz@phytec.de>
Tested-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-08 11:12:38 -05:00
Daniel Schultz
ab92e0322d conf: machine: include: k3: Select correct WKS file
Select the correct WKS file according to the MACHINE_FEATURE efi.

Right now, the sdimage-2part-efi.wks is set by default. Switch to the
sdimage-2part.wks file, if efi was removed from MACHINE_FEATURES to allow
non-efi boot methods.

Signed-off-by: Daniel Schultz <d.schultz@phytec.de>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-08 11:12:38 -05:00
Randolph Sapp
f1bab6abb0 ti-img-rogue-umlibs: package firmware separately
Split the firmware into it's own package so we can make the insane
checks a little more paranoid again.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-08 11:11:09 -05:00
Randolph Sapp
ade5e668dc cairo: resolve opengl version
Cairo can either be built for use with OpenGL or OpenGLES. By default it
assumes it can use OpenGL if X11 is provided as a distro feature. This
assumption is not true when using the proprietary SGX / Rogue drivers.

Vulkan libraries need some X libs at runtime now, so we need to manually
override the PACKAGECONFIG for cairo to use OpenGLES.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-08 11:11:09 -05:00
Randolph Sapp
6225d78b65 pvr-mesa: add new vulkan configuration options and wsi
Add the required vulkan configuration options and the new PVR WSI file to
the corresponding package.

Also bump the PV to match the version of Mesa actually being shipped.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-08 11:11:09 -05:00
Randolph Sapp
50f5e36332 ti-img-rogue-umlibs: bump srcrev, add vulkan, update deps
Update the source revision for the following upstream changes:
	- Drop the included ICD loader. Use the Mesa/Khronos one
	  instead.
	- Enable all vulkan window system extensions

Separate the vulkan libs into their own package so people can choose to
ignore them if they want, considering the new runtime deps.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-08 11:11:09 -05:00
Ryan Eatmon
63c14bcacd gdbserverproxy-module-drv: Fix patch fuzz
Some how I missed that there was fuzz when applying the patch, which
master treats as an error.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-04 15:20:28 -05:00
Denys Dmytriyenko
d606b53903 linux-bb.org: add support for config fragments
* Add support for additional config fragments passed via semi-standard
  KERNEL_CONFIG_FRAGMENTS variable
* Also don't build all DTBs, only those specified in the machine config

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-03 08:40:08 -05:00
Randolph Sapp
c1d4a25172 graphics: upgrade rogue graphics to 23.1.6404501
Update the rogue graphics recipes to point at the new 23.1.6404501
release. This adds support for:
	- kernel 6.1
	- vulkan
	- opencl (more testing needed)
	- zink (more testing needed)

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-03 08:38:42 -05:00
Randolph Sapp
1b313bcd80 mesa: update pvr-mesa for the 22.3.5 version of mesa
Update the pvr-mesa include to use the 22.3.5 patches from
oe-core/master and the branch for DDK version 23.1 on freedesktop.

Also remove the PACKAGECONFIG options elf-tls and xvmc as those
functions were dropped by the oe-core/master version of this package and
mesa package respectively.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-03 08:38:42 -05:00
Randolph Sapp
ec99a3c13d mesa: locally overlay 22.3.5-specific patches from oe-core/master
Locally overlay verbatim copies of mesa 22.3.5 patches from
oe-core/master, so the same codebase works in kirkstone and master.

Also drop the old patches from 22.0 that were from the tip of
oe-core/kirkstone previously.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-05-03 08:38:42 -05:00
Andrew Davis
558ebdcf22 ti-rtos-firmware: Use the same directory structure as linux-firmware
Currently we move this firmware around and put it in a directories named
pdk-ipc/ and ethfw/. This does not match what is in linux-firmware which
is what projects should expect /lib/firmware to match. This causes issues
for projects that want to work both on meta-ti and also on any other distro.

Switch to shipping the same directory structure as linux-firmware here.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-20 08:15:32 -05:00
Andrew Davis
af1d4c9add ti-rtos-firmware: Do not provide default CORESDK_RTOS_VERSION
The version information should come from the ti-linux-fw.inc and this
version is old anyway.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-20 08:15:32 -05:00
Denys Dmytriyenko
fa9e4f8125 meta-ti-bsp: add mesa to SIGGEN_EXCLUDERECIPES_ABISAFE list
For TI platforms with SGX and Rogue graphics we patch upstream Mesa with
PVR support and conditionally enable features based on virtual/gpudriver
preference. This makes Mesa package platform-specific and it contains the
corresponding PACKAGE_ARCH = "${MACHINE_ARCH}" line.

In order to get greater re-use from generic non-machine-speciofic packages
down the dependency chain, such as Wayland, Weston, Qt5 modules, etc. we
need to mark mesa recipe as still providing stable OpenGL ABIs, such as
EGL, GLES, GBM, etc. - add it to SIGGEN_EXCLUDERECIPES_ABISAFE list.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Reviewed-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-18 15:20:49 -05:00
Andrew Davis
6cae32babe meta-ti-bsp: Remove SGX driver from SIGGEN_EXCLUDERECIPES_ABISAFE
Neither of recipes nor their ABI is all that stable. OpenGL might be
slightly more stable, but that is not what these provide anymore.
The variable helps with re-use of generic packages down the dependency
tree, when they depend on a machine-specific package. SGX UM used to
provide different standard OpenGL ABIs (EGL, GLES, GBM) and hence was
listed here. Now those ABIs are provided by Mesa, so SGX is removed.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-18 15:18:34 -05:00
Andrew Davis
af68e3192c ti-sgx-ddk-km: Use PVR_BUILD and PVR_WS to match Rogue
Use these to select build type and window system support to match how
the Rouge driver does the same. No functional change.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-18 15:13:48 -05:00
Andrew Davis
e9d468ff6d ti-sgx-ddk-km: Be specific on supported K3 machines
Of the K3 family only the AM65x device is currently supported by this
driver. COMPATIBLE_MACHINE should match.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-18 15:13:48 -05:00
Andrew Davis
dff7ed6468 ti-sgx-ddk-um: Remove no longer needed CLEANBROKEN and INSANE_SKIPs
The "clean" target has been fixed along with some other issues that
caused us to need these set. Remove them now.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-18 15:13:48 -05:00
Andrew Davis
a786148c45 ti-sgx-ddk-um: Remove RDEPENDS on libdrm-omap
We no longer use libdrm-omap so remove it.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-18 15:13:48 -05:00
Andrew Davis
76bd751f74 gdbc6x: Fix kernel module to work on v5.15+
Small changes, the "upstream" doesn't look to be maintained anymore,
so if we get any more breaks it might be time to remove this recipe.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-18 15:01:45 -05:00
Andrew Davis
bc894bf52e conf: machine: Set common default SERIAL_CONSOLES for all K3
The traditional order of serial consoles for K3 has ttyS2 being the
primary UART attached console. ttyS0 is also a common choice for
distros and the TI kernel may switch at some point. To prepare
we check both UARTs on all K3 devices. Move this common check
to a K3 common location.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-18 09:18:15 -05:00
Andrew Davis
6a00c74301 linux-ti-next: Update to v6.3-rc6 next version
Signed-off-by: Andrew Davis <afd@ti.com>
Reviewed-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-12 07:54:04 -05:00
Andrew Davis
dfb0d783dc linux-ti-next: Remove unneeded do_compile append
Was used to build kernel DTBs prior to KERNEL_DEVICETREE getting populated
with the list of preset of upstream DTBs. Not needed anymore so remove.

Signed-off-by: Andrew Davis <afd@ti.com>
Reviewed-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-12 07:54:04 -05:00
Andrew Davis
07dd54cb14 linux-ti-next: Add defconfig for OMAP-L138
Not sure if anyone is testing on this device with -next, but for
completeness add its defconfig.

Signed-off-by: Andrew Davis <afd@ti.com>
Reviewed-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-12 07:54:04 -05:00
Andrew Davis
98427b0011 linux-ti-mainline: Update to v6.2 mainline version
Signed-off-by: Andrew Davis <afd@ti.com>
Reviewed-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-12 07:54:04 -05:00
Andrew Davis
94e93e2b6b linux-ti-mainline: Remove ti-upstream-tools
Mainline should test the mainline kernel as it is, not with out-of-tree
changes like new DTB/DTBOs. Use only upstream DTB/DTBOs. As that was the
last thing provided by ti-upstream-tools, remove it here.

Signed-off-by: Andrew Davis <afd@ti.com>
Reviewed-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-12 07:54:04 -05:00
Andrew Davis
00a4a5ed31 linux-ti-mainline: Use upstream configs with upstream kernel
Mainline should test the mainline kernel as it is, not with out-of-tree
changes like to the default configuration that one would get when using
a stock distro. Use only upstream configuration.

Signed-off-by: Andrew Davis <afd@ti.com>
Reviewed-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-12 07:54:04 -05:00
Ryan Eatmon
da6f02540f patches: Add missing Upstream-Status to various patches
The check-layer command caught that we were missing the Upstream-Status
on a few older patches, and I found a few new ones.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-11 09:01:52 -05:00
Denys Dmytriyenko
6fa8e2dbaa optee: remove bbappends with version bumps
meta-arm now has all optee components updated to the latest 3.20 version

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-11 09:01:52 -05:00
Denys Dmytriyenko
32c76bb5df machine: switch beaglebone and beagle-x15 to bb.org kernel/u-boot
Switch 32-bit beaglebone and beagle-x15 platforms to use linux-bb.org and
u-boot-bb.org recipes for simplicity and for additional Beagle-specific
features that are added on top of TI reference kernel, such as dynamic
management of capes and other OOBE enhancements.

Cc: Robert Nelson <robertcnelson@gmail.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-10 11:21:14 -05:00
Denys Dmytriyenko
381b997f95 machine: beagleplay: add new BeaglePlay platform
* Add configs for BeaglePlay Cortex-A53 and Cortex-R5F cores (am62xx SoC family)
* Uses corresponding linux-bb.org and u-boot-bb.org recipes
* U-boot for now uses a separate branch for BeaglePlay

Cc: Robert Nelson <robertcnelson@gmail.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-10 11:21:14 -05:00
Denys Dmytriyenko
ef63c52960 beaglebone-ai64: add new DTBOs, remove duplicate settings
* 5.10.162 added 2 new DT overlays
* Remove duplicate settings that are already set in SoC config

Cc: Robert Nelson <robertcnelson@gmail.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-10 11:21:14 -05:00
Denys Dmytriyenko
374e035aa6 u-boot-bb.org: use dedicated branch for beaglebone-ai64
Use dedicated branch for BB-AI64 that includes recent changes for new
memory part.

Cc: Robert Nelson <robertcnelson@gmail.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-10 11:21:14 -05:00
Denys Dmytriyenko
04bc169a3d linux-bb.org: update to 5.10.162 and dedicated branches
* Update both 32 and 64-bit trees to 5.10.162
* Switch from using a common branch that gets periodically rebased to using
  dedicated per-merge branches
* Patch 32-bit defconfig to use LZMA compression instead of LZO, that is
  being deprecated in OE-Core

Cc: Robert Nelson <robertcnelson@gmail.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-10 11:21:14 -05:00
Ryan Eatmon
b95384b639 conf: change from do_image_wic/tar to do_image_complete
When trying to support OpenBMC, we found that our use of do_image_wic
and do_image_tar for adding depends and mcdepends was too limiting.
Moving to do_image_complete is a higher level in the tree that means
for any image type the dependencies will be correct.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-05 13:58:50 -05:00
Robert Nelson
26665b1fea meta-ti-bsp: BeagleBoard-u-boot switch to GitHub mirror
BeagleBoard.org use the new u-boot mirror on GitHub
https://github.com/beagleboard/u-boot as
https://git.beagleboard.org/ easily becomes overloaded

Signed-off-by: Robert Nelson <robertcnelson@gmail.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-04 16:41:46 -05:00
Khem Raj
34e8a5b269 linux-ti-staging: Fix build with gcc13
Backport a patch from Linux mainline [1]

Thanks Martin Jansa for figuring it out.

[1] https://github.com/torvalds/linux/commit/f07788079f515

Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-04 16:38:38 -05:00
Matthias Schiffer
b492cb8457 ti-sgx-ddk-um: fix error in postinst with sysvinit+udev
When sysvinit is in DISTRO_FEATURES, the update-rc.d class must only be
inherited when the script referenced by INITSCRIPT_NAME actually exists,
or the update-rc.d command in the generated postinst script will fail.

Reported-by: Denys Dmytriyenko <denis@denix.org>
Signed-off-by: Matthias Schiffer <matthias.schiffer@ew.tq-group.com>
Reviewed-by: Andrew Davis <afd@ti.com>
Acked-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-04-03 13:49:30 -05:00
Robert Nelson
994fa26a12 meta-ti-bsp: BeagleBoard switch to GitHub mirror
BeagleBoard.org's GitLab instance: https://git.beagleboard.org/
easily becomes overloaded, switch to GitHub mirror.

Signed-off-by: Robert Nelson <robertcnelson@gmail.com>
Reviewed-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-31 17:11:53 -05:00
Theodore A. Roth
3659c01234 meta-ti-bsp: Update mesa bbappend files for mesa-23
The mesa recipes in oe-core have been updated to mesa-23 causing the
following build error:

    $ bitbake core-image-minimal
    Loading cache: 100% |                                               | ETA:  --:--:--
    Loaded 0 entries from dependency cache.
    Parsing recipes: 100% |#############################################| Time: 0:00:20
    Parsing of 2816 .bb files complete (0 cached, 2816 parsed). 4472 targets, 484 skipped, 0 masked, 0 errors.
    ERROR: No recipes in default available for:
      /build/../oe/meta-ti/meta-ti-bsp/recipes-graphics/mesa/mesa-gl_22.%.bbappend
      /build/../oe/meta-ti/meta-ti-bsp/recipes-graphics/mesa/mesa_22.%.bbappend

    Summary: There was 1 ERROR message, returning a non-zero exit code.

Signed-off-by: Theodore A. Roth <troth@openavr.org>
Signed-off-by: Theodore A. Roth <theodore_roth@trimble.com>
Reviewed-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-31 09:44:32 -05:00
Ryan Eatmon
92d465f4e6 u-boot-ti-staging: Add 2023.04 in prep for LTS migration
We are preparing to migrate our u-boot version to 2023.04.  As we are still
working on the migration, mark the default preference low for this
version.  We will enable building with this u-boot in a meta-arago brand
in the near future.  Once the migration is complete, we will remove the
2021.01 u-boot and make this the default.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Praneeth Bajjuri <praneeth@ti.com>
2023-03-31 09:25:46 -05:00
Ryan Eatmon
094be4d0f5 linux-ti-staging: Add 6.1 kernel in prep for LTS migration
We are preparing to migrate our kernel version to 6.1.  As we are still
working on the migration, mark the default preference low for this
version.  We will enable building with this kernel in a meta-arago brand
in the near future.  Once the migration is complete, we will remove the
5.10 kernel and make this the default.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-31 09:25:41 -05:00
Ryan Eatmon
4baa0cbd9b linux-ti-*: Add filtering for which dtb/dtbo to include
We often carry more dtbs/dtbos in our kernel than we have upstreamed.
The inclusion of all of the dtb/dtbo in the KERNEL_DEVICETREE has become
problematic as we start testing the linux-next and 6.1 as part of our
LTS migration.  To address this issue we are adding in two step method
for managing the KERNEL_DEVICETREE.

Going forward we will only accept dtb/dtbo in KERNEL_DEVICETREE if it is
available in upstream.  This way we ensure that the variable is more
accurate for whichever kernel you might be looking at.  We have also
added a new variable KERNEL_DEVICETREE_PREFIX which our kernel recipes
will use to auto set KERNEL_DEVICETREE based on what files are in the
kernel and not a fixed list in the conf files.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-31 09:25:37 -05:00
Ryan Eatmon
2d5d741f9b kernel-fitimage: Add signing of fitImage entries for 5.10 kernel
While we are mirgrating to kernel v6.1 and u-boot v2023.04, we want to
keep kernel v5.10 and u-boot v2021.01 "working" for anyone looking at
kirkstone.  One of the items we are looking at changing is the signing
of entries in the fitImage.

To try and acheive a limited parity with dunfell while we work on the
migration, this commit creates a class that implements the logic that was in
dunfell and applies that class to the 5.10 kernel.

This is a temporary patch that will be remvoed when we remove the 5.10
recipe down the road.  This logic will not apply to the 6.1 kernel.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-31 09:25:29 -05:00
Ryan Eatmon
72cd51fa11 optee-os: Only sign files for platforms that support it
We are seeing some testing issues where the new code that signs all of
the files at all times is causing issues.  So rollback the logic and
only sign for platforms that support it.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-31 09:25:19 -05:00
Ryan Eatmon
aeb44bbe53 trusted-firmware-a: Only sign files for platforms that support it
We are seeing some testing issues where the new code that signs all of
the files at all times is causing issues.  So rollback the logic and
only sign for platforms that support it.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-31 09:24:17 -05:00
Ryan Eatmon
97ea27cc3f u-boot-ti-staging: Fix u-boot configs to match oe-core fitImage
After moving to the oe-core kernel-fitimage.bbclass we found that the
dtb names we were searching for did not match.  This was due to the
KERNEL_DEVICETREE entries including the vendor subdir in the section
names of the fitImage file.  This patch updates support in 2021 so that
we can temporarily get to a stable boot point before starting our LTS
migration and changing a lot of things in the recipes.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-31 09:24:00 -05:00
Ryan Eatmon
d3edf89da2 ti-sci-fw: Fix some syntax issues
Fixing some syntax issues from the last dunfell to kirkstone sync up
patch series.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:04:58 -05:00
Denys Dmytriyenko
404a8835b5 ti-rtos-firmware: numerous fixes and cleanups
Doing multiple do_install:prepend overrides does not guarantee the
order - it was observed that signing could fail as it was happening
prior to symlinking to the correct name. Move signing code inside the
main do_install, so the machine-specific do_install:prepend works
correctly.

Also, pass -f flag for symlinking, otherwise it could fail with "file
already exists" error when trying to re-build the recipe again.

Several IPC list/matrix fixes:
* j721e was missing MCU_1_1_FW entry
* j721s2 was also missing MCU_1_1_FW entry
* j721s2 had a second MCU_2_0_FW in place of MCU_3_0_FW
* j784s4 was missing MCU_4_0_FW and MCU_4_1_FW entries

Other minor cleanups and indentation fixes.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Denys Dmytriyenko
b1aa926874 linux-ti-staging: update to the latest from Dunfell
Match the latest sha used in Dunfell.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Denys Dmytriyenko
90b5051f37 u-boot-ti-staging: update to the latest from Dunfell
Match the latest sha used in Dunfell.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Denys Dmytriyenko
294a193722 ti-linux-fw: update to the latest from Dunfell
Match the latest sha used in Dunfell.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Denys Dmytriyenko
06e0157824 ti-k3-secdev: update to the latest from Dunfell
Match the latest sha used in Dunfell.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Siddharth Vadapalli
88eb96ef96 conf: machine: am62axx: Add overlay for second CPSW3G Port
The SK-Ethernet-DC01 Add-On Ethernet Card for AM62A-SK board supports
RGMII mode.

Add overlay to enable the second CPSW3G port in RGMII-RXID mode with the
Add-On Ethernet Card.

Signed-off-by: Siddharth Vadapalli <s-vadapalli@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Vaishnav Achath
f236123f6b conf: machine: j784s4-evm: Add MCSPI loopback overlay for J784S4
Add the MCSPI loopback overlay file for J784S4 EVM which helps
users to enable MCU-MAIN MCSPI loopback applications, even though
the overlay is named j7200-mcspi-loopback.dtbo, same can be used
for testing on other J7 platforms as well.

Signed-off-by: Vaishnav Achath <vaishnav.a@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Vaishnav Achath
fcb758ffdd conf: machine: j721s2-evm: Add MCSPI loopback overlay for J721S2
Add the MCSPI loopback overlay file for J721S2 EVM which helps
users to enable MCU-MAIN MCSPI loopback applications, even though
the overlay is named j7200-mcspi-loopback.dtbo, same can be used
for testing on other J7 platforms as well.

Signed-off-by: Vaishnav Achath <vaishnav.a@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Vaishnav Achath
53ccb6278f conf: machine: j721e-evm: Add MCSPI loopback overlay for J721E
Add the MCSPI loopback overlay file for J721E EVM which helps
users to enable MCU-MAIN MCSPI loopback applications, even though
the overlay is named j7200-mcspi-loopback.dtbo, same can be used
for testing on other J7 platforms as well.

Signed-off-by: Vaishnav Achath <vaishnav.a@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Bhavya Kapoor
c1148f0011 conf: machine: j784s4-evm: Add uarts overlay for J784S4
Add device tree overlay for extending support for mcu_uart0 as well as
wkup_uart0 for boards with J784S4 SoC. This overlay will mainly be used
for the purpose of testing uart instances.

Signed-off-by: Bhavya Kapoor <b-kapoor@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Bhavya Kapoor
255b0f6f81 conf: machine: j721s2-evm: Add uarts overlay for J721S2
Add device tree overlay for extending support for mcu_uart0 as well as
wkup_uart0 for boards with J721S2 SoC. This overlay will mainly be used
for the purpose of testing uart instances.

Signed-off-by: Bhavya Kapoor <b-kapoor@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Bhavya Kapoor
8c78422190 conf: machine: j721e-evm: Add uarts overlay for J721E
Add device tree overlay for extending support for mcu_uart0 as well as
wkup_uart0 for boards with J721E SoC. This overlay will mainly be used
for the purpose of testing uart instances.

Signed-off-by: Bhavya Kapoor <b-kapoor@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Bhavya Kapoor
3160d7e907 conf: machine: j7200-evm: Add uarts overlay for J7200
Add device tree overlay for extending support for mcu_uart0 as well as
wkup_uart0 for boards with J7200 SoC. This overlay will mainly be used
for the purpose of testing uart instances.

Signed-off-by: Bhavya Kapoor <b-kapoor@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Vaishnav Achath
34c4cdeaa1 conf: machine: j784s4-evm: Add camera overlays for J784S4 EVM
Add the following overlay files on J784S4 EVM:

1. Fusion board (For FPDLink-III cameras)
2. OV5640 camera module

Signed-off-by: Vaishnav Achath <vaishnav.a@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Vaishnav Achath
515c89cb34 conf: machine: j721s2-evm: Add camera overlays for J721S2 EVM
Add the following overlay files on J721S2 EVM:

1. Fusion board (For FPDLink-III cameras)
2. OV5640 camera module

Signed-off-by: Vaishnav Achath <vaishnav.a@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Vaishnav Achath
40ea9c1793 conf: machine: j721e-evm: Add camera overlays for J721E EVM
Add the following overlay files on J721E EVM:

1. Fusion board (For FPDLink-III cameras)
2. IMX390 FPDLink camera module
3. IMX219 RPi-compatible camera module

Signed-off-by: Vaishnav Achath <vaishnav.a@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Vaishnav Achath
6aa51ce72a conf: machine: j7200-evm: Add MCSPI loopback overlay for J7200
Add the MCSPI loopback overlay file for J7200 EVM which helps
users to enable MCU-MAIN MCSPI loopback applications.

Signed-off-by: Vaishnav Achath <vaishnav.a@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Dasnavis Sabiya
1f258bdb64 conf: machine: j784s4: Add ehrpwm overlay for am69-sk
The AM69 SK has PWM output pins connected to its RPi header. Add
overlay file to enable PWM pins.

Signed-off-by: Dasnavis Sabiya <sabiya.d@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Aradhya Bhatia
cecce222e2 conf: machine: am62xx-lp-evm: Add OLDI Panel overlay
Add the Microtips OLDI Panel DT overlay for AM62 LP SK.

Signed-off-by: Aradhya Bhatia <a-bhatia1@ti.com>
Reviewed-by: Praneeth Bajjuri <praneeth@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Sinthu Raja
cdb570d3e4 conf: machine: j721s2: Add ehrpwm overlay for am68-sk
The AM68 SK has PWM output pins connected to its RPi headers. Add
overlay file to enable PWM pins.

Signed-off-by: Sinthu Raja <sinthu.raja@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Dasnavis Sabiya
b6820fd6b0 conf: machine: j784s4: Add FPDLink overlays for AM69 SK
Add the overlay files for AM69 SK:
1. Fusion board (For FPDLink-III cameras).
2. IMX390 FPDLink-III camera module that includes both the CM and
   RCM type of modules.

Signed-off-by: Dasnavis Sabiya <sabiya.d@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Sinthu Raja
02663ef00f conf: machine: j721s2: Add FPDLink overlays for am68-sk
Add the overlay files, over AM68 SK, for the following:

 1. Fusion board (For FPDLink-III cameras).
 2. IMX390 FPDLink-III camera module which includes both the CM and
    RCM type of modules.

Signed-off-by: Sinthu Raja <sinthu.raja@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Sinthu Raja
71854ee327 conf: machine: j721s2: Fix DTB overlay extension for OV5640
The extension for OV5640 overlay is incorrect. Therefore, update the
correct extension to build the overlay with .dtbo

Fixes: f67e9805 ("conf: machine: j721s2: Add AM68 SK specific dtb and dtbo to KERNEL_DEVICETREE")
Signed-off-by: Sinthu Raja <sinthu.raja@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Dasnavis Sabiya
c0414a10d5 conf: machine: j784s4: Add AM69 SK specific dtb and dtbo to KERNEL_DEVICETREE
AM69 Starter Kit is a single board designed based on TI's AM69 SOC
providing advanced system integration in automotive ADAS applications,
autonomous mobile robot and edge AI applications. Add support
for the same to include the board dtb file into the root filesystem.

Add DT overlays support for the following features on AM69 SK:
* Add DTBO entry to support OV5640 camera
* Add DTBO entry to support RPi(IMX219) camera
* Add DTBO entry for the DDR memory carveout.

[1]:https://www.ti.com/lit/zip/spruj52

Signed-off-by: Dasnavis Sabiya <sabiya.d@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Jai Luthra
e4f3d0dac4 conf: machine: am62axx: Add overlays for IMX390 cameras
IMX390 is a 2MP FPDLink-III raw camera. This sensor was originally
targeted for J7-based devices, but AM62A can re-use the existing
overlays. Both the CM and RCM type of modules are supported.

As AM62A only has one CSI-RX port, we only use 4 out of the 8 total
FPDLink ports on the fusion board.

Signed-off-by: Jai Luthra <j-luthra@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Sinthu Raja
0266a8977d conf: machine: j721s2: Add AM68 SK specific dtb and dtbo to KERNEL_DEVICETREE
AM68 Starter Kit is a low cost, small form factor board designed for
TI's AM68/J721S2 SoC[1] which is optimized to provide best in class performance
for industrial applications. Add DTB entry for the same.

AM68 SK features camera support with MIPI(OV5640) and RPi(IMX219) connectors.
Add DTBO for the same. Also, add DTBO entry for the DDR memory carveout.

[1]:http://www.ti.com/lit/zip/spruj28

Signed-off-by: Sinthu Raja <sinthu.raja@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Jai Luthra
6594550bc0 conf: machine: am62axx: Add camera overlays for AM62A SK
Add the following overlay files on AM62A SK:

1. Fusion board (For FPDLink-III cameras)
2. OV2312 FPDLink camera module
3. IMX219 RPi-compatible camera module

Signed-off-by: Jai Luthra <j-luthra@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Aradhya Bhatia
2bb9ab9d3d conf: machine: am62xx: Add missing overlays for AM625 SK
Add the overlay files, over AM625 SK, for the following:

1. Technexion OV5640 Camera
2. Enhanced Capture (ECAP)
3. HDMI Audio Output
4. MCAN Transceiver
5. Microtips OLDI Panel

Signed-off-by: Aradhya Bhatia <a-bhatia1@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Dasnavis
ae7e399555 conf: machine: j784s4-evm: Add support for J784S4 HS-FS
Add the basic J784S4 HS-FS configuration.
* Add configurations to support both HS-FS and GP keeping GP as default.
* Add ti-sci-firmware overrides for HS-FS.
* Remove evm conf file inclusion in hs-evm conf.
* Add j784s4 hs-evm specific config to hs-evm conf.

Signed-off-by: Dasnavis Sabiya <sabiya.d@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Sai Sree Kartheek Adivi
c8a96a7299 am62axx-evm: Add AM62A HS-FS evm configuration
Lets add the basic AM62A configuration
- Add machine conf for AM62A.
- The wic images will boot on AM62A HS-FS devices by default.
- The sysfw image for GP and HS-SE will be packaged in the wic image as
  tiboot3-am62ax-gp-evm.bin and tiboot3-am62ax-hs-evm.bin respectively.
- Add ti-sci-firmware overrides.
- Sign ATF, OPTEE and RTOS Firmware.

Signed-off-by: Chirag Shilwant <c-shilwant@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Sinthu Raja
daf2262214 conf: machine: j721s2-evm: Add support for J721S2 HS-FS
Add the basic J721S2 HS-FS configuration.
    - Add configurations to support both HS-FS and GP keeping GP
      as default.
    - Add ti-sci-firmware overrides for HS-FS.
    - Remove evm conf file inclusion in hs-evm conf.
    - Add j721s2 hs-evm specific config to hs-evm conf.

Signed-off-by: Aniket Limaye <a-limaye@ti.com>
Signed-off-by: Sinthu Raja <sinthu.raja@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Ryan Eatmon
252b8ad2c5 ti-sci-fw: Add SYSFW_SUFFIX to sysfw.itb files
With the advent of using multiconfigs to build all of the versions of
the machines (gp, hs-se, hs-fs, etc...) the sysfw.itb has become a point
of contention for do_deploy.  To resolve the duplicate file copy errors
from bitbake we need to uniquify the sysfw.itb file names.  So, let's do
the same thing we do with the tiboot3.bin file and add the SYSFW_SUFFIX
into the name.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Chirag Shilwant
75cddc215e am62xx-lp-evm: Add AM62x LP HS-FS evm configuration
Lets add the basic AM62x LP HS-FS configuration
- Add machine conf for AM62x LP HS-FS.
- The wic images will boot on AM62x LP HS-FS devices by default.
- The sysfw image for HS-SE will be packaged in the wic image as
  tiboot3-am62x-hs-evm.bin.
- Add ti-sci-firmware overrides.

Signed-off-by: Chirag Shilwant <c-shilwant@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Chirag Shilwant
ee7ac55504 am62xx-evm: Add AM62x HS-FS evm configuration
Lets add the basic AM62x HS-FS configuration
- Add machine conf for AM62x HS-FS.
- The wic images will boot on AM62x HS-FS devices by default.
- The sysfw image for GP and HS-SE will be packaged in the wic image as
  tiboot3-am62x-gp-evm.bin and tiboot3-am62x-hs-evm.bin respectively.
- Add ti-sci-firmware overrides.

Signed-off-by: Chirag Shilwant <c-shilwant@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Sinthu Raja
e619334e9c conf: machine: k3: Define RD, DTB and DTBO load address for FIT image
K3 platforms include the FIT image-based kernel by default. The bootloader
loads the kernel and DTB from the FIT image. The DTB/DTBOs are added to the
FIT image but the load address is not included in the image section of
each DTB/DTBO. This load address is determined by the LOADADDRESS macros
in the kernel-fitmage class.

Hence, define the RD/DTB/DTBOs LOADADDRESS and OFFSET macros in the K3 common
include, and remove those macros defined in the K3 board specific config files.

Signed-off-by: Sinthu Raja <sinthu.raja@ti.com>
Reviewed-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Denys Dmytriyenko
05fb51715f optee-os-tadevkit: update to match optee-os
This installs shared OPTEE-OS APIs and needs to match in order for latest
client/test/examples to be able to build.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Manorit Chawdhry
2857a0abe3 optee: update optee components to 3.20 tag
OPTEE tests is not being upgraded due to a newer python dependency for
the build

Signed-off-by: Manorit Chawdhry <m-chawdhry@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Chirag Shilwant
17e230e365 machine: Add AM62x HS-SE evm configuration
Lets add the basic AM62x HS-SE configuration.
- Add machine conf for AM62x HS-SE.
- The wic images will boot on AM62x GP devices by default.
- To boot on AM62x HS-SE, simply switch out the SYSFW image:
           $ cd /mnt/sd-card/boot
           $ mv tiboot3-am62x-hs-evm.bin tiboot3.bin

- Add ti-sci-firmware overrides.
- Add support to sign ATF and OPTEE.

Signed-off-by: Chirag Shilwant <c-shilwant@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Bryan Brattlof
b04409dcc3 k3conf update SRCREV to add am62ax support
update the SHA of k3conf to pickup am62ax support

Signed-off-by: Bryan Brattlof <bb@ti.com>
Reviewed-by: Praneeth Bajjuri <praneeth@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Judith Mendez
b5381aeb1f trusted-firmware-a: upgrade to v2.8+
Upgrade arm-trusted-firmare to v2.8-226-g2fcd408bb.

This upgrade picks up K3 L2 cache, snoop delayed, and EA
handling updates from upstream master.

Do not update to tip of master due to PSCI system off
support breaking AM62x and AM62q platforms.

Signed-off-by: Judith Mendez <jm@ti.com>
Reviewed-by: Denys Dmytriyenko <denys@konsulko.com>
Tested-by: Manorit Chawdhry <m-chawdhry@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Dhruva Gole
2b9a1b8dd6 optee-os: Enable SW PRNG for OP-TEE in AM62X
commit 98506a4a07 ("optee-os: Update SRCREV for OP-TEE TRNG in AM62X")

Disables SW PRNG => Enabling Hardware RNG. This is breaking Suspend Resume
on AM62xx EVM variants. To fix this keep using SOFTWARE_PRNG enabled as
it was.

Cc: vibhore@ti.com
Cc: Andrew Davis <afd@ti.com>
Signed-off-by: Dhruva Gole <d-gole@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Ryan Eatmon
71618f6e77 hs: Deploy the unsigned versions of bl31 and bl32
In addition to releasing the signed versions of the bl31.bin and
bl32.bin files, also release the unsigned original versions.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Chirag Shilwant
3f47f79afe machine: Add AM62Q HS-SE evm configuration
Lets add the basic AM62Q HS-SE configuration.
- Add configurations.
- Add ti-sci-firmware overrides.
- Add u-boot overrides.
- Add optee overrides.
- Add ti-rtos-firmware overrides.

Signed-off-by: Chirag Shilwant <c-shilwant@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Praneeth Bajjuri
8d174266e5 optee-os: Lower log level for am62axx
Lower the log level for am62axx platform

commit 27641e1f2d ("optee-os: Lower log level for AM62x")
changes the log level for am62xx platforms.
This patch is to extend the same for am62axx

Signed-off-by: Praneeth Bajjuri <praneeth@ti.com>
Reported-by: Sai Sree Kartheek Adivi <s-adivi@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Devarsh Thakkar
2ef8667bc0 ipc: ti-rpmsg-char: Update library to 0.5.2
Update library to 0.5.2 as it adds support for AM62A
SoC.

Co-Authored-By: Sai Sree Kartheek Adivi <s-adivi@ti.com>
Signed-off-by: Devarsh Thakkar <devarsht@ti.com>
Acked-by: Praneeth Bajjuri <praneeth@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Manorit Chawdhry
29e9b3b63e optee: update optee-test, optee-examples to 3.19 tag
optee-os is already at 3.20 tag but the others were still outdated.

Updates other optee components to 3.19 tag

Signed-off-by: Manorit Chawdhry <m-chawdhry@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Kamlesh Gurudasani
d5a0cb6896 optee-os: Revert to lower log level for AM62x
While removing SOFTWARE_PRNG support
commit:98506a4a07363a1b57012ccfaee263f47e5b46c4,
accidently removed the changes applied
by commit:27641e1f2d7f6696fd7bbd8f24fcac20766b6234
(optee-os: Lower log level for AM62x).

Reverting those changes back

Signed-off-by: Kamlesh Gurudasani <kamlesh@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Paresh Bhagat
129b52b0fd machine: Add am62axx evm configuration
Lets add the basic AM62Axx-evm configuration.
- Add configurations.
- Add firmware overrides.
- Add u-boot overrides.
- Add tifs-lpm-stub.
- Add cnm-wave-fw.

Signed-off-by: Sai Sree Kartheek Adivi <s-adivi@ti.com>
Signed-off-by: Paresh Bhagat <p-bhagat@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Ryan Eatmon
0288443726 conf: Remove vmlinux.gz from KERNEL_IMAGETYPES
With a recent patch to the TI kernel that includes debug symbols,
the vmlinux.gz file grew in size that impacted the testing.
This file is not needed to be in the final image so remove it
from the list.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Zachary Booth
666a488046 conf: omap-a15: Fix parsing when KERNEL_DEVICETREE is not set
Correctly handle parsing when KERNEL_DEVICETREE is not set.

Signed-off-by: Zachary Booth <zachary.booth@garmin.com>
Signed-off-by: Joshua Watt <Joshua.Watt@garmin.com>
Signed-off-by: Joshua Watt <JPEWhacker@gmail.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Kamlesh Gurudasani
668a702edb optee-os: Enable OP-TEE TRNG in AM62X
Enable trng support as trng support is added now in OP-TEE

Signed-off-by: Kamlesh Gurudasani <kamlesh@ti.com>
Signed-off-by: Jayesh Choudhary <j-choudhary@ti.com>
Acked-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Manorit Chawdhry
d498e41a62 j784s4-hs: changes to support new hs platform
Changes to support new j784s4-hs platform in:

    1) ti-sci-fw_git: Update firmware prefix for j784s4-hs
    2) atf: sign the image
    4) optee: sign the image

Signed-off-by: Manorit Chawdhry <m-chawdhry@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Manorit Chawdhry
06ca37a28b conf: machine: Add J784S4 hs platform
Machine conf for J784S4 HS platform.
Used J721S2 hs as reference.

Signed-off-by: Manorit Chawdhry <m-chawdhry@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-21 13:03:29 -05:00
Andrew Davis
0fa0afc0b9 ti-rtos-firmware: Deploy secure firmware unconditionally
Having signed firmware is needed for the HS platforms, but does not
cause any issues for non-HS. To keep things simple, let's deploy
both sets unconditionally. This prevents mistakes when adding HS
support and further reduces the image delta between the two types.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-01 09:24:28 -06:00
Andrew Davis
99f45b1275 ti-rtos-firmware: Fix use of base_libdir with nonarch_base_libdir
Firmware belongs in the nonarch lib directory. Use the right variable.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-01 09:24:28 -06:00
Andrew Davis
2122ea84b6 ti-rtos-firmware: Use a table instead of a list of copy commands
Using a table makes it easier to see what firmware is included with
each machine build. It also helps prevent errors here.

Since the same functions run across machines we now sign all the firmware
without needing to add a new signing function for each new machine.

Another fix is that we install the DM firmware to the deploy directory
for all machines that use need it. This was added for J7x machines
but missed for AM62x.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-01 09:24:28 -06:00
Andrew Davis
5d3e675b5d ti-rtos-firmware: Use defines to set firmware names
This allows us to change the name in one spot and avoid duplication.
It also helps prevent hard to see changes/typos in the firmware names.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-01 09:24:28 -06:00
Andrew Davis
27a1742c5b ti-rtos-firmware: Do not break the source directory by renaming files
If we rename files in the source directory the next time we need to rebuild
the original files will be gone and build will fail. Use symlinks instead.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-01 09:24:28 -06:00
Andrew Davis
50c0aad841 ti-rtos-firmware: Fix name for AM64x and AM62x firmware
The firmware for AM64x and AM62x are renamed to match the other platforms,
but we don't actually change them to match. Remove baremetal from the
names.

These are only referenced to by softlink, so this change will have no
effect on Linux users.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-01 09:24:28 -06:00
Andrew Davis
8546439c58 ti-rtos-firmware: Remove unneeded per-machine TARGET defines
Since these TARGET defines are only used on the machine for which
an ALTERNATIVE is defined and always have the same name, these
provide nothing. Drop them.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-01 09:24:28 -06:00
Andrew Davis
ee75598a38 ti-k3-secdev: Remove inclusion of ti-paths.inc
Since this directory path will not change, let's avoid use
of ti-paths.inc which is set to be removed.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-01 09:24:28 -06:00
Andrew Davis
5349ee1deb conf: machine: k3: Remove unneeded TI_SECURE_DEV_PKG_K3 assignments
For K3 machines the SECDEV selection happens in the recipes that use it.
This assignment is therefor no longer needed. Remove it.

Suggested-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-01 09:24:28 -06:00
Andrew Davis
c5483cceca ti-sci-fw: Use new ti-secdev class to sign the images
Use the new ti-k3-secdev package to pull in the signing tools if they are
not provided by the environment.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-01 09:24:28 -06:00
Andrew Davis
5c1db20699 ti-rtos-firmware: Use new ti-secdev class to sign the images
Use ti-k3-secdev native package to provide secure-binary-image.sh script
when it is not passed on as an environment variable. This fixes an issue
with AM64xx which is always HS but should not require TI_SECURE_DEV_PKG
when building for HS-FS or GP platforms.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-01 09:24:28 -06:00
Andrew Davis
f82e111123 u-boot-ti: Use new ti-secdev class to sign the images
Use the new ti-k3-secdev package to pull in the signing tools if they are
not provided by the environment. This allows us to use these tools
unconditionally. Remove the checks for the script and do the signing
for all K3 machines. The signature is automatically stripped from
the binaries on non-HS devices at boot time as needed so this change
is harmless for GP devices.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-01 09:24:28 -06:00
Andrew Davis
c9848791fb optee-os: Use new ti-secdev class to sign the images
Use the new ti-k3-secdev package to pull in the signing tools if they are
not provided by the environment. This allows us to use these tools
unconditionally. Remove the checks for the script and do the signing
for all K3 machines. The signature is automatically stripped from
the binaries on non-HS devices at boot time as needed so this change
is harmless for GP devices.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-01 09:24:28 -06:00
Andrew Davis
95e7682551 trusted-firmware-a: Use new ti-secdev class to sign the images
Use the new ti-k3-secdev package to pull in the signing tools if they are
not provided by the environment. This allows us to use these tools
unconditionally. Remove the checks for the script and do the signing
for all K3 machines. The signature is automatically stripped from
the binaries on non-HS devices at boot time as needed so this change
is harmless for GP devices.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-01 09:20:15 -06:00
Andrew Davis
ede16ed8de meta-ti-bsp: Add helper class for TI Security Development Tools
The setup here is common to all packages that require signing with
the TI Security Development Tools. Add a helper class to factor out
this commonality.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-01 09:18:09 -06:00
Andrew Davis
f25344f876 ti-linux-fw: update to the latest
While here update FW versions and remove those no longer used.

Signed-off-by: Andrew Davis <afd@ti.com>
Reviewed-by: Denys Dmytriyenko <denys@konsulko.com>
Tested-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-01 09:15:24 -06:00
Jose Quaresma
37de5fcd84 ti-img-rogue-umlibs: handling the firmware installation with usrmerge
The ti-img-rogue-umlibs package is not obeying usrmerge distro feature. /lib should be relocated to /usr. [usrmerge]

Signed-off-by: Jose Quaresma <jose.quaresma@foundries.io>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-03-01 09:14:22 -06:00
Denys Dmytriyenko
696c7d090d conf/machine: fix use of screen and touchscreen machine features
Some machine configs didn't specify their use of screen and touchscreen
machine features correctly, fix them.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-02-24 08:38:07 -06:00
Ryan Eatmon
d859c8c091 conf: machine: Fallback to software rendering
While we are working to update our platforms to support Weston 10 and
beyond, we are falling back to software rendering for platforms that do
not currently have a solution for GPU drivers (namely the boards that
use SGX).

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-02-24 08:38:07 -06:00
Randolph Sapp
3c2ab9f56a meta-ti-bsp: machine: set SGX display controller alias
Set SGX display controller alias variables accordingly, as SGX has a few
different aliases across platforms.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-02-24 08:38:07 -06:00
Randolph Sapp
515a6c7e9b meta-ti-bsp: machine: remove default preferences for egl,gles,gbm
Remove default preferences for virtual/egl, virtual/libgles and virtual/libgbm
from machine configs to follow the new dependency chains via mesa in oder to
support accelerated and software-rendered graphics, which is selected by
virtual/gpudriver preference.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-02-24 08:38:07 -06:00
Randolph Sapp
600d45cdb0 meta-ti-bsp: graphics: Resolve dependency chain
Patched mesa will now be configured based on what virtual/gpudriver
preferred provider is selected. The gpu drivers will now runtime
recommend the associated UM components.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-02-24 08:38:07 -06:00
Denys Dmytriyenko
b5d687fe46 mesa: locally overlay 22.0-specific patches from oe-core/kirkstone
Locally overlay verbatim copies of mesa 22.0 patches from oe-core/kirkstone,
so the same codebase works in kirkstone and master. Since upstream version
of mesa in master is now 22.3 and no longer carries these patches, but they
are still needed for 22.0-based PVR fork of mesa used with Rogue driver.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-02-24 08:38:07 -06:00
Denys Dmytriyenko
a85553a214 Revert "meta-ti-bsp: graphics: Resolve dependency chain"
Merged by accident.

This reverts commit 15417ca726.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-02-21 09:03:43 -06:00
Denys Dmytriyenko
85742dd952 Revert "meta-ti-bsp: machine: Remove all gpu features"
Merged by accident.

This reverts commit 51bb56b74c.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-02-21 09:03:43 -06:00
Denys Dmytriyenko
9f5db9c713 Revert "meta-ti-bsp: machine: Attempt to update DC alias"
Merged by accident.

This reverts commit 0dd6a86b9a.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-02-21 09:03:43 -06:00
Denys Dmytriyenko
92adfccf9d Revert "conf: machine: Fallback to software rendering"
Merged by accident.

This reverts commit 5ae790999e.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-02-21 09:03:43 -06:00
Ryan Eatmon
5ae790999e conf: machine: Fallback to software rendering
While we are working to update our platforms to support Weston 10 and
beyond, we are falling back to software rendering for platforms that do
not currently have a solution for GPU drivers (namely the boards that
use SGX).

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-02-16 13:33:40 -06:00
Randolph Sapp
0dd6a86b9a meta-ti-bsp: machine: Attempt to update DC alias
Attempt to update the SGX display controller alias variable according to
what Andrew told me. SGX apparently had a few different aliases across
platforms.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-02-16 13:31:05 -06:00
Randolph Sapp
51bb56b74c meta-ti-bsp: machine: Remove all gpu features
Remove all gpu machine features and instead rely on the new dependency
chain for resolving gpu dependencies. Set preferred providers for
virtual/gpudriver where needed.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-02-16 13:31:05 -06:00
Randolph Sapp
15417ca726 meta-ti-bsp: graphics: Resolve dependency chain
Patched mesa will now be configured based on what virtual/gpudriver
preferred provider is selected. The gpu drivers will now runtime
recommend the associated um components.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-02-16 13:31:05 -06:00
Denys Dmytriyenko
248bea1c50 conf/machine/k3r5.inc: update bootflow links
Original READMEs with bootflows were reworked and moved to a dedicated doc/
folder in more recent U-boot versions. Update links in the k3r5 config file
accordingly to provide some basic explanation of K3 bootflows.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-02-16 13:31:05 -06:00
Andrew Davis
610f1f498b uio-module-drv: Remove deprecated uio-module-drv
UIO drivers are generally frowned upon in the community, and for PRU
we now have much better alternatives in RProc, RPmsg, and PRU-Consumer.
Let's not send the wrong message by continuing to support this crufty
interface. Remove the kernel module, DTBs, and test recipe.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-02-16 13:31:05 -06:00
Ryan Eatmon
20405b32e1 linux-bb.org: work around for too few arguments to function init_disassemble_info() error
binutils 2.39 changed the signature of init_disassemble_info(),
which now causes perf and bpftool to fail to compile.

Relevant binutils commit: [1]

There is a proper fix in development upstream[2].
This is a work-around for older kernels.

Inspired by a patch by Anton Antonov to fix this issue on meta-arm
kernels. [3]

[1] https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff;h=60a3da00bd5407f07d64dff82a4dae98230dfaac
[2] https://patchwork.kernel.org/project/netdevbpf/cover/20220801013834.156015-1-andres@anarazel.de/
[3] https://patchwork.yoctoproject.org/project/arm/patch/20220824025819.4888-1-jon.mason@arm.com/#5104

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-02-07 08:25:08 -06:00
Denys Dmytriyenko
f843fa1914 meta-ti-bsp: add BeagleBone AI-64 support
BeagleBone AI-64 (https://beagleboard.org/ai-64) uses Texas Instruments
Jacinto TDA4VM/J721e SoC. Officially BeagleBone AI-64 supports Debian
Linux and builds its BSP on top of meta-ti and TI SDK, but adds custom
DTBs and DTBO overlays, plus integrates other drivers and features.

Let's add corresponding recipes for beagleboard.org kernel and u-boot
along with the BeagleBone AI-64 machine config.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-01-31 14:44:38 -06:00
Matthias Schiffer
0b3fa09a5f ti-sgx-ddk-um: use udev for userspace initialization
The ti-sgx-ddk driver requires an additional userspace initialization
step after the kernel module has probed the device. Without this
initialization, no EGL context can be created and Weston etc. will fail to
start.

The driver package contains an init script, but this does not work on pure
systemd-based systems without sysvinit compat support (as provided by the
systemd-compat-units package). Introduce an enabled-by-default
PACKAGECONFIG that installs a udev rule instead to run the init command
automatically when the driver is loaded, solving the issue without
depending on a specific init system. On builds without udev, this
PACKAGECONFIG can be disabled, reverting to the old init script-based
solution.

udev reports several events when the pvrsrvkm module is loaded:

- add event for the kernel module
- add events for two DRM devices
- bind event for the GPU platform device

The DRM devices aren't nice to match on, and the kernel module add is
too early to run `pvrsrvctl --start`, so we trigger on the platform
device bind.

Tested with Weston 9.0.0 on the AM65x-based TQ-Systems MBa65xx.

Signed-off-by: Matthias Schiffer <matthias.schiffer@ew.tq-group.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-01-31 14:44:38 -06:00
Matthias Schiffer
649a0357d5 treewide: replace leftover git://git.ti.com
These URIs have been updated in dunfell, but two instances were
forgotten in kirkstone/master.

Signed-off-by: Matthias Schiffer <matthias.schiffer@ew.tq-group.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-01-31 14:44:38 -06:00
Jose Quaresma
1e99e1354d ti-sci-fw: sets TI_K3_SECDEV_INSTALL_DIR default value
The TI_K3_SECDEV_INSTALL_DIR is defined on the meta-ti-extras layer
so when the layer is not used the variable is undefined.
For such cases we can use default value that is the same defined
on the recipes-ti/includes/ti-paths.inc

Signed-off-by: Jose Quaresma <jose.quaresma@foundries.io>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-01-31 14:44:38 -06:00
Jose Quaresma
4bc0e6af68 ti-k3-secdev: sets TI_K3_SECDEV_INSTALL_DIR_RECIPE default value
The TI_K3_SECDEV_INSTALL_DIR_RECIPE is defined on the meta-ti-extras layer
so when the layer is not used the variable is undefined.
For such cases we can use default value that is the same defined
on the recipes-ti/includes/ti-paths.inc

Signed-off-by: Jose Quaresma <jose.quaresma@foundries.io>
Acked-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-01-31 14:44:38 -06:00
Jose Quaresma
b7823d771c ti-k3-secdev: move from meta-ti-extras to meta-ti-bsp
The meta-ti-bsp layer is still broken for K3 HS platforms.

The patch [1] makes the check-layer happy again as it does not
fail any more during bitbake parsing but it will be difficult
for the end user to discover this dependency on meta-ti-extras.
On the other side, meta-ti-extras depends on meta-ti-bsp so
this is a circular dependency.

Currently the layer is broken for am62xx-evm/am64xx-evm machines:

| ERROR: Nothing PROVIDES 'ti-k3-secdev-native' (but mc:k3r5:/srv/oe/build/conf/../../layers/meta-ti/meta-ti-bsp/recipes-bsp/ti-sci-fw/ti-sci-fw_git.bb DEPENDS on or otherwise requires it). Close matches:
|  libtspi-dev-native
|  makedevs-native

[1] - 8e43835c ti-sci-fw: make dependency on meta-ti-extras soft

Signed-off-by: Jose Quaresma <jose.quaresma@foundries.io>
Acked-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-01-31 14:44:38 -06:00
Andrew Davis
cdc19549d5 conf: machine: Rework do_image_wic dependencies
The WIC image for K3 depends on the TI-SCI firmware, on AM65x and J721e
also the bootloader. Make this clear by only depending on firmware in
the base k3.inc file, then adding the bootloader dependency in AM65x and
J721e specific includes.

Remove unneeded overrides from the evm level files.

Remove do_image_tar dependencies as the tar files do not include
the bootloader nor TI-SCI firmware, only the boot partition of
the WIC file needs these.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-01-24 12:51:24 -06:00
Andrew Davis
4033c054c0 conf: machine: Move TFA_BOARD and OPTEEMACHINE to the SoC level
These defines are specific to a SoC, not a SoC family (K3) nor
any specific board. Move these to the SoC level for all boards
to be consistent with boards already doing this correctly.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-01-24 12:51:24 -06:00
Andrew Davis
0942b58dab conf: machine: Remove OPTEEOUTPUTMACHINE definition
This was used in the base Linaro optee-os_git.bb recipe, it is
no longer used, remove it from our boards.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-01-24 12:51:24 -06:00
Andrew Davis
c9f9e4e9ac conf: machine: Remove j7 grouping and j7.inc
J7 is an unneeded level of grouping that is now causing issues and
leading to mistakes when adding new J7 based platforms. Each J7x
family device should use the SoC name specifically to prevent
accidentally adding or removing features that are not meant
for the new SoC.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-01-24 12:51:24 -06:00
Andrew Davis
f5653ce0ae conf: machine: Use new J7 SoC names over specific board names
Now that we have SoC names, we can avoid adding features based on the
board name. We expect folks to create their own boards based on these
SoCs, and so using the TI made EVM board name everywhere adds extra churn
when adding a new board. Plus it is more correct for most of these
features as they depend on the SoC, not on the EVM board.

One other thing we do here is to not use the generic "j7" name,
the current and future J7 devices are far to feature diverse
to group at this level. Grouping like that will lead to the wrong
things getting enabled as new J7 SoCs are added.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-01-24 12:51:24 -06:00
Andrew Davis
7cd8114bb0 conf: machine: j784s4: Move common defines into j784s4.inc
Like we do with J721e, J7200, and J721s2, use a SoC header include file
to define common properties. This eases adding new boards based on these
SoC.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-01-24 12:51:24 -06:00
Andrew Davis
5e082976b9 conf: machine: Remove multi-certificate image comment
Multi-cert is already now the default, no need to add a comment on that.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-01-24 12:51:24 -06:00
Denys Dmytriyenko
04791d24e2 optee-os: sync up with upstream meta-arm update
Upstream meta-arm has updated optee-os to 3.19 and our local changes
conflict with that. Update bbappend to match upstream.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-01-24 12:50:06 -06:00
Andrew Davis
0e5df43108 meta-ti-bsp: Move legacy HS signing classes into this layer
These were in the meta-arago layer, but any distro should be able
to run on HS devices. So move the classes and setup to the BSP layer.

Signed-off-by: Andrew Davis <afd@ti.com>
Reviewed-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-01-24 12:50:06 -06:00
Andrew Davis
7033f0e804 ti-sgx-ddk-um: Update SRCREV for Kirkstone support
Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-01-24 12:50:06 -06:00
Andrew Davis
a46edd771a meta-ti-bsp: Add am57xx.inc allowing use of SoC name over full EVM name
In many spots we have to use the full EVM name for each EVM using the
AM57x SoC leading to missed features on some EVMs. Add the am57xx name
so we can generically add for AM57x.

Signed-off-by: Andrew Davis <afd@ti.com>
Reviewed-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-01-24 12:50:06 -06:00
Ryan Eatmon
54087fb0ea layer.conf: Add kirkstone, langdale back into LAYERSERIES_COMPAT
Rather than just support mickledore we should also support the other
layers that we still support to ensure that as many as different
versions we can.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-01-11 14:53:10 -06:00
Khem Raj
e18e18005d layer.conf: Update LAYERSERIES_COMPAT for mickledore
oe-core switched to mickedore [1]

[1] https://git.openembedded.org/openembedded-core/commit/?id=57239d66b933c4313cf331d35d13ec2d0661c38f

Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-01-04 13:17:27 -06:00
Ryan Eatmon
bd1318d2ed k3r5: Use the ?= default assignment to allow for overrides
Move to setting the values for PREFERRED_PROVIDER using the
?= default assignment so that we can override the setting if
we would like to.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2023-01-04 13:17:27 -06:00
Ryan Eatmon
f20ceaa7fb linux-ti-staging: Clean up init_disassemble_info() patch
There were fuzz errors with the patch that needed to be cleaned up,
and for some reason a v2 that was supposed to move the duplicate
patches in files/ was not pushed properly before merging.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-12-04 15:09:32 -06:00
Denys Dmytriyenko
0f39cef228 optee: drop 3.17 versions
These bbappends were bumping versions to 3.17 when upstream only provided
3.16 version. Now that upstream meta-arm provides 3.18 versions, there's
no need for the bbappends, especially since they break in do_install.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-12-01 15:05:13 -06:00
Khem Raj
6b89b23df4 ffa-debugfs-mod: Remove bbappend
The main recipe in meta-arm is gone with 5.19 kernel onwards

Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-12-01 15:04:17 -06:00
Denys Dmytriyenko
8e43835c4d ti-sci-fw: make dependency on meta-ti-extras soft
Replace "require" with "include" to load ti-paths.inc and not break
parsing when meta-ti-extras is not in the BBLAYERS list.

As ti-paths.inc is only needed to define TI_K3_SECDEV_INSTALL_DIR
for ti-k3-secdev when TI_SECURE_DEV_PKG_K3 is not set and building
for K3 HS platforms. Since ti-k3-secdev resides in meta-ti-extras,
the soft dependency will still work fine and give a build error
"Nothing PROVIDES 'ti-k3-secdev-native'" when it is needed.

Also, since TI_K3_SECDEV_INSTALL_DIR can now be undefined, use
d.getVar() to access it ensuring it doesn't break the condition.

Reported-by: Daniel Díaz <mrchapp@gmail.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-12-01 15:03:47 -06:00
Ryan Eatmon
d083ee992f linux-ti-staging: work around for too few arguments to function init_disassemble_info() error
binutils 2.39 changed the signature of init_disassemble_info(),
which now causes perf and bpftool to fail to compile.

Relevant binutils commit: [1]

There is a proper fix in development upstream[2].
This is a work-around for older kernels.

Inspired by a patch by Anton Antonov to fix this issue on meta-arm
kernels. [3]

[1] https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff;h=60a3da00bd5407f07d64dff82a4dae98230dfaac
[2] https://patchwork.kernel.org/project/netdevbpf/cover/20220801013834.156015-1-andres@anarazel.de/
[3] https://patchwork.yoctoproject.org/project/arm/patch/20220824025819.4888-1-jon.mason@arm.com/#5104

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-27 19:24:17 -06:00
Ryan Eatmon
a072e9d0fb ti-unpack: Remove update_data call
update_data() was removed from upstream bitbake, so we should remove
the call from our code as well.

584989ed2b

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-25 16:48:40 -06:00
Ryan Eatmon
4056431375 optee-os: Remove 3.18 patches from our 3.19 recipe
These patches are from upstream against v3.18, but we moved to v3.19 and the
patches are now invalid.  These can be removed once upstream moves up to or
beyond v3.19.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 19:11:35 -06:00
Denys Dmytriyenko
0ae9fbb11c conf/machine/omapl138: correct few of the machine settings
Cleanup and unify again - omapl138-lcdk is the only platform supported in
the OMAP-L1 family. Plus there's no longer DaVinci family with corresponding
settings. Adjust accordingly.

Please note, there's currently a bug building Rust on ARMv5 platforms:
https://bugzilla.yoctoproject.org/show_bug.cgi?id=14967

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Andrew Davis
92fdd13c1c cmem-mod: Remove CMEM kernel module
CMEM has been deprecated for removal for some time now. All users should
have migrated to the Linux upstream DMA-BUF Heaps framework. Remove CMEM.

We only remove the kernel module part in this patch to prevent builds
from breaking in the meta-arago layer due to dependencies on the CMEM
library. These packages should either be updated or disabled. After
that we will remove the library.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Praneeth Bajjuri
cc0afdae52 optee-os: Upgrade to upstream 3.19.0
Update to the latest upstream master which is 3.19.0.

Signed-off-by: Praneeth Bajjuri <praneeth@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Randolph Sapp
08db1e1cf8 ti-img-rogue-driver: Bump the source revision
Bump the source revision for the rogue pvr kernel module.

Source changelog:
  - A hack was added to increase stability on J7 platforms while we are
    looking into a proper fix for cache coherency issues in this module

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Denys Dmytriyenko
d1e5358bec ti-sci-fw: use getVar() to check if TI_SECURE_DEV_PKG_K3 is defined
Otherwise undefined variable is returned literally as ${TI_SECURE_DEV_PKG_K3}
and the condition won't work.

Cc: Andrew Davis <afd@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Denys Dmytriyenko
473927d5bd ti-k3-secdev: include ti-paths.inc
Include ti-paths.inc so TI_K3_SECDEV_INSTALL_DIR_RECIPE gets defined and
artifacts are installed in the correct location.

Cc: Andrew Davis <afd@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Denys Dmytriyenko
8ce06fe12c linux-ti-staging: update to the latest
This matches current version in Dunfell.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Denys Dmytriyenko
cbc1b036e3 u-boot-ti-staging: update to the latest
This matches current version in Dunfell.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Denys Dmytriyenko
0c75cdda64 ti-linux-fw: update to the latest
This matches current version in Dunfell.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Ryan Eatmon
5c35b2fa87 cnm-wave-fw: update firmware name to wave521c_k3_codec_fw.bin
update firmware name to wave521c_k3_codec_fw.bin to align with
linux-firmware main branch. the following patch is part of
ti-linux-firmware thru mainline sync.

commit 48407ffd ("cnm: update chips&media wave521c firmware.")

Signed-off-by: Praneeth Bajjuri <praneeth@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Jayesh Choudhary
e8d7286266 optee-os: Enable TRNG driver as OP-TEE support is added
OP-TEE upstream now has support for sa3ul for j721s2 platform.
Re-enable the trng driver which was disabled earlier.

Signed-off-by: Jayesh Choudhary <j-choudhary@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Jayesh Choudhary
2bf95d97ae conf: machine: j721s2: Add OP-TEE flavour
Change the OP-TEE flavour from default k3-j721e to k3-j784s4
as sa3ul support for j784s4 is upstreamed in OP-TEE and we
can use the same settings in j721s2 to access TRNG.

Signed-off-by: Jayesh Choudhary <j-choudhary@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Jayesh Choudhary
082dfdeea4 conf: machine: j784s4: Add OP-TEE flavour
Add the new OP-TEE flavour for J784S4 instead of default k3-j721e.
The TI-SCI ID for MCU domain sa2ul/sa3ul are not the same for
J721E and J784S4. So a new flavour is added in upstream OP-TEE.

Signed-off-by: Jayesh Choudhary <j-choudhary@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Jayesh Choudhary
c397bba16a optee-os: Update SRCREV for OP-TEE TRNG in J784S4
Update the SRCREV to the commit when sa3ul support was
added in upstream OP-TEE for J784S4 platform to access rng.

Signed-off-by: Jayesh Choudhary <j-choudhary@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Ryan Eatmon
c60a9a2859 j721s2 and j784s4: Correct serial console device
Serial console in J721S2/J784S4 EVM config was set to ttyS10.  It should be ttyS2.
This caused sysv based systems (eg, tiny) to apparently hang because of no login prompt.
This didn't show up as a problem on systemd systems (eg, default) because systemd will
automatically setup a serial tty with the console option passed in on the kernel command line
(using console=...), which U-Boot correctly passes in as ttyS2 for J721S2/J784S4.

Signed-off-by: Jonathan Humphreys <j-humphreys@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Denys Dmytriyenko
805943b5c0 ti-img-rogue-driver: drop local patch as upstream is now fixed
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Randolph Sapp
14fcd9a9bf ti-img-rogue-*: Bump the graphics recipes
Bump the graphics recipes source revision and remove the old BVNC
switch. The BVNC is now baked into the platform Makefile that is
selected with PVR_BUILD_DIR / TARGET_PRODUCT.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Andrew Davis
e0ff5cbd25 trusted-firmware-a: Update to latest upstream master
Notable changes include support for J784s4.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Ryan Eatmon
c74ea6f30b machine: Add j784s4-evm configuration.
Adding support for j784s4-evm:
- Add configurations.
- Add firmware.
- Add u-boot.
- Add gpu support.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Hari Nagalla <hnagalla@ti.com>
Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Ryan Eatmon
e6f1b2edf0 ti-img-rogue-driver: Fix git SRC_URI
We missed a spot when updating all of the git access for git.ti.com
to use HTTPS.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Praneeth Bajjuri
2e81f60882 ipc: ti-rpmsg-char: Update library to 0.5.1
Update the ti-rpmsg-char library to 0.5.1 version that enables the
support for R5F on am62x SoCs.

Signed-off-by: Praneeth Bajjuri <praneeth@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Manorit Chawdhry
b4502cc32b ti-rtos-firmware: j721s2-hs-evm: add secure firmware images
Adds support for secure firmware images in J721S2 HS EVM.

Signed-off-by: Manorit Chawdhry <m-chawdhry@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Manorit Chawdhry
2ee63c5d7f ti-rtos-firmware: j7200-hs-evm: add secure firmware images
Adds support for secure firmware images in J7200 HS EVM.

Signed-off-by: Manorit Chawdhry <m-chawdhry@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Manorit Chawdhry
04705ec7f7 ti-rtos-firmware: j721e-hs-evm: add secure firmware images
Adds support for secure firmware images in J721E HS EVM.

Signed-off-by: Manorit Chawdhry <m-chawdhry@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Denys Dmytriyenko
529bd52c5d linux-ti-mainline: unbreak devtool
devtool has a long-standing bug where it cannot handle references to ${WORKDIR}
due to externalsrc:
https://bugzilla.yoctoproject.org/show_bug.cgi?id=12677

linux-ti-mainline clones additional ti-upstream-tools repo alongside the kernel
sources into ${WORKDIR}, which exposes this devtool bug.

Work around the issue by moving ti-upstream-tools inside the kernel source tree,
i.e. inside ${S}

Reported-by: Radoslav Pesek <radoslav.pesek@microstep-mis.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Andrew Davis
b8616f4627 conf: machine: am64xx: Move multi-config targets into base SoC include
The supported device types depends on the SoC, not on any specific
board or EVM. Any board can be populated with any of the 3 supported
AM64x types. Move these into the AM64x common include.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Andrew Davis
3395cb0bcc conf: machine: am64xx-evm: Switch to SR2.0 HS-FS build by default
AM64x devices will only be available as SR2.0 HS-FS. Set this as the
default type provided by the SDK. To allow SR2.0 HS-SE to continue to
boot, like we did with GP, we add an extra machine to build SR2.0 HS-SE
SYSFW. To use on SR2.0 HS-SE boards simply switch out the SYSFW image:

$ cd /mnt/sd-card/boot
$ mv tiboot3-am64x_sr2-hs-evm.bin tiboot3.bin

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Rahul T R
598a832221 cadence-mhdp-fw: Add dependency for j721s2
cdns mhdp bridge is present in j721s2 soc.
Add the dependency for the same

Signed-off-by: Rahul T R <r-ravikumar@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Randolph Sapp
68f9392fc3 ti-sci-fw: Use d.getVar() in DEPENDS expression
Switch the DEPENDS_append expression to use d.getVar() instead of the
usual variable expansion to prevent the inline Python command from
becoming mangled.

Signed-off-by: Randolph Sapp <rs@ti.com>
Acked-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Andrew Davis
6ac89438e6 optee-os: Lower log level for AM62x
During resume from low power mode suspend OP-TEE prints some messages
on the UART. It seems this UART is not powered at this point in the
sequence breaking suspend/resume. We should track down the exact
prints and quiet them. Until we get that fix upstream, lets lower
the log level for this platform to unblock the LPM work.

Signed-off-by: Andrew Davis <afd@ti.com>
Acked-by: Anand Gadiyar <gadiyar@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Andrew Davis
bdfc41492a optee-os: Upgrade to upstream 3.18.0
Update to the latest upstream master which is 3.18.0.

Signed-off-by: Andrew Davis <afd@ti.com>
Reviewed-by: Praneeth Bajjuri <praneeth@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Anand Gadiyar
79fc6e6f91 machine: add am62xx-lp-evm configuration
This platform is similar to the currently supported am62xx-evm, except
that we currently need new defconfigs for u-boot and new dtbs in the
filesystem.

Signed-off-by: Anand Gadiyar <gadiyar@ti.com>
Cc: Hari Nagalla <hnagalla@ti.com>
Cc: Andrew Davis <afd@ti.com>
Cc: Praneeth Bajjuri <praneeth@ti.com>
Cc: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Andrew Davis
29ed73bad4 conf: machine: am64xx-evm: Update default HS names
In the latest U-Boot the HS images for AM64x have been renamed to the
default names, and the GP have been changed to *_unsigned. Remove
the overrides to pull the now default HS images.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Ryan Eatmon
8adeecdc49 all: Stop using git://git.ti.com
Stop using un-encrypted git:// protocol to access TI repositories.

This is inline with the same arguments as made by github in
https://github.blog/2021-09-01-improving-git-protocol-security-github/

Signed-off-by: Nishanth Menon <nm@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Andrew Davis
4457391897 conf: machine: am64xx-evm: Make HS-SE the default
The HS-SE AM64xx machine can now be run on GP devices and built without
needing the TI_SECURE_DEV_PKG for the same. AM64xx will only be available
in the HS-FS type going forward. Make the HS-SE the default and remove
the original GP machine.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Andrew Davis
be1ddf405d u-boot-ti-staging: Update to the latest ti-u-boot-2021.01
Update to the latest commit of ti-u-boot-2021.01.

As part of this U-Boot update the non-HS AM64x-evm defconfig was removed.
This is okay as building this defconfig without defining TI_SECURE_DEV_PKG
will still result in usable binaries for the non-HS devices. Use the
HS defconfig for both the HS and non-HS machines.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Andrew Davis
fa6c1e0176 ti-sci-fw: Use ti-k3-secdev if TI_SECURE_DEV_PKG_K3 is not defined
Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Andrew Davis
dbc37abd67 recipies-ti: Add TI K3 Security Development Package
Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Praneeth Bajjuri
52eaeb872c trusted-firmware-a: upgrade to v2.7
upgrade arm-trusted-firmare to v2.7

Signed-off-by: Praneeth Bajjuri <praneeth@ti.com>
Tested-by: Judith Mendez <jm@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Andrew Davis
71ae142a05 ti-sci-fw: Add am65xx-evm-k3r5-sr2 to combined R5 boot list
This machine was missed when making combined R5 boot the default.
Add this machine to fix build failure.

Reported-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Denys Dmytriyenko
48b22e8266 k3: also inherit kernel-fitimage class for FIT image generation
In order to support fitImage image type, kernel-fitimage class is needed.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Andrew Davis
f584f736dc conf: machine: k3: Add fitImage to the default kernel image types
FIT Image based kernels are valid for all K3 devices, not just HS, deploy
this kernel image type by default so it doesn't have to be appended on
a per-device-type basis.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Andrew Davis
252d345f1a conf: machine: am64xx-hs-evm: Add extra machine to build GP SYSFW
Use multiconfig to generate a GP SYSFW image. This allows the HS SDK
to be used on GP boards by simply switching out the SYSFW image:

$ cd /mnt/sd-card/boot
$ mv tiboot3-am64x-gp-evm.bin tiboot3.bin

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Andrew Davis
23f5b48d8f ti-sci-fw: Only deploy the raw SYSFW images for one machine target
This recipe deploys the raw SYSFW unconditionally which causes issues
when doing multiconfig builds. What should happen is only one deploys
these, select that the same way we select which one deploys the default
SYSFW symlink. Move the deploy step there.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Andrew Davis
9e035d6fbe conf: machine: Move K3 TI_SECURE_DEV_PKG definition to common include
The K3 TI_SECURE_DEV_PKG is the same for all devices, move this out
of each machine file and into the common K3 includes. This doesn't
have any effect on the GP machines as they make no use of it.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Andrew Davis
ad7db9c97f ti-sci-fw: Only install and deploy combined boot symlink when set
Add SYSFW_TIBOOT3_SYMLINK and use it the same way we use SYSFW_SYMLINK
for the non-combined boot flow, to allow not setting the default for
some machine types.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Andrew Davis
dcd64932bf ti-sci-fw: Make combined R5 boot the default
Going forward, the combined tiboot3.bin is going to be the standard. Only
AM65x and J721e will still use the split boot.

Set DEPENDS and EXTRA_OEMAKE for combined boot and override only for the
two split boot platforms. This makes it easier to add new platforms and
simplifies deployment logic.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Andrew Davis
c388ad3df1 ti-sci-fw: Use SYSFW_TIBOOT3 to point to the SYSFW image
Currently we reuse UBOOT_* names which usually are the same we
want to give to the name of the SYSFW binary. This isn't always
correct, we should use a SYSFW specific variable in case the
UBOOT names are changed.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Andrew Davis
485a6955c5 ti-sci-fw: Deploy all SYSFW firmware types
This allows us to rebuild and re-sign the SYSFW image if needed from
the deploy directory for any SoC type.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Andrew Davis
feb3357c74 ti-sci-fw: Use new SOC_TYPE and SYSFW_DIR to simplify recipe
The k3-image-gen now has two new helper flags SOC_TYPE and SYSFW_DIR
that we can use to simplify this recipe. With these we do not need to do
anything different here for HS builds, the SOC_TYPE selects this now.

DL_URL also do not need cleared anymore, the k3-image-gen will no longer
download missing files when not needed for the current build type.

do_install and do_deploy can also check for the existence of either
sysfw.itb or tiboot3.bin and install/deploy as needed. k3-image-gen only
gerneates the right one now depending on the SoC. Merge all these
steps for all SoCs.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Andrew Davis
f112212083 machine: k3r5: Make combined R5 boot the default
Going forward, the combined tiboot3.bin is going to be the standard. Only
AM65x and J721e will still use the split boot. Set the output of U-Boot
to be u-boot-spl.bin by default and override only for the two split boot
platforms. This makes it easier to add new platforms and simplifies
deployment logic.

Signed-off-by: Andrew Davis <afd@ti.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Denys Dmytriyenko
1cea5220ea linux-ti-next: add recipe for building linux-next
Required for daily test plans. Can be enabled in local.conf or <distro>.conf:

PREFERRED_PROVIDER_virtual/kernel = "linux-ti-next"
SRCREV:pn-linux-ti-next = "${AUTOREV}"

Only uses in-tree defconfigs, does not support config fragments, builds and
packages in-tree DTBs.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Denys Dmytriyenko
92598343f3 u-boot-ti-mainline: update to the latest 2022.10
Update to the latest release version.
bzip2 license was added to the list, update checksum.

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Denys Dmytriyenko
8ea305bf98 u-boot: drop 2020.01
Deprecated in favor of 2021.01

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Denys Dmytriyenko
27b1bfc1e0 linux: drop 5.4 kernel
Deprecated in favor of 5.10

Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-11-23 16:08:24 -06:00
Ryan Eatmon
c023b50537 u-boot: Remove lzop dependency
lzop support has been moved from oe-core to meta-oe.  Since we are not
setting FIT_KERNEL_COMP_ALG and (for minimal poky builds) we would like
to not require meta-oe just for this, just remove the dependency entirely.

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-10-17 13:05:21 -05:00
Ryan Eatmon
928d30486b trusted-firmware-a: work around RWX permission error on segment
Binutils 2.39 now warns when a segment has RXW permissions[1]:

  aarch64-none-elf-ld.bfd: warning: bl31.elf has a LOAD segment with RWX permissions

However, TF-A passes --fatal-warnings to LD, so this is a build failure.

There is a ticket filed upstream[2], so until that is resolved we can
disable this warning.

[1] https://sourceware.org/git/?p=binutils-gdb.git;a=commit;h=ba951afb99912da01a6e8434126b8fac7aa75107
[2] https://developer.trustedfirmware.org/T996

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>

Adapted from the above patch[3] in meta-arm, but we cannot use that patch as
we are on an older SRCREV and the Makefile has changed.

[3] https://git.yoctoproject.org/meta-arm/commit/meta-arm/recipes-bsp?id=977c5222d8c2f6f6c7e522e480a6e4cd40ba32d7

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
2022-10-17 13:04:19 -05:00
247 changed files with 4626 additions and 3410 deletions

View File

@@ -0,0 +1,758 @@
inherit ti-secdev kernel-uboot uboot-sign-legacyhs
FITIMAGE_HASH_ALGO ?= "sha1"
FITIMAGE_PACK_TEE ?= "0"
FITIMAGE_DTB_BY_NAME ?= "0"
FITIMAGE_TEE_BY_NAME ?= "0"
FITIMAGE_CONF_BY_NAME ?= "0"
python __anonymous () {
kerneltypes = d.getVar('KERNEL_IMAGETYPES') or ""
if 'fitImage' in kerneltypes.split():
depends = d.getVar("DEPENDS")
depends = "%s u-boot-mkimage-native dtc-native" % depends
d.setVar("DEPENDS", depends)
uarch = d.getVar("UBOOT_ARCH")
if uarch == "arm64":
replacementtype = "Image"
elif uarch == "mips":
replacementtype = "vmlinuz.bin"
elif uarch == "x86":
replacementtype = "bzImage"
elif uarch == "microblaze":
replacementtype = "linux.bin"
else:
replacementtype = "zImage"
# Override KERNEL_IMAGETYPE_FOR_MAKE variable, which is internal
# to kernel.bbclass . We have to override it, since we pack zImage
# (at least for now) into the fitImage .
typeformake = d.getVar("KERNEL_IMAGETYPE_FOR_MAKE") or ""
if 'fitImage' in typeformake.split():
d.setVar('KERNEL_IMAGETYPE_FOR_MAKE', typeformake.replace('fitImage', replacementtype))
image = d.getVar('INITRAMFS_IMAGE')
if image:
d.appendVarFlag('do_assemble_fitimage_initramfs', 'depends', ' ${INITRAMFS_IMAGE}:do_image_complete')
# Verified boot will sign the fitImage and append the public key to
# U-boot dtb. We ensure the U-Boot dtb is deployed before assembling
# the fitImage:
if d.getVar('UBOOT_SIGN_ENABLE'):
uboot_pn = d.getVar('PREFERRED_PROVIDER_u-boot') or 'u-boot'
d.appendVarFlag('do_assemble_fitimage', 'depends', ' %s:do_deploy' % uboot_pn)
if d.getVar('FITIMAGE_PACK_TEE') == "1":
d.appendVarFlag('do_assemble_fitimage', 'depends', ' optee-os:do_deploy')
}
# Options for the device tree compiler passed to mkimage '-D' feature:
UBOOT_MKIMAGE_DTCOPTS ??= ""
fitimage_ti_secure() {
if test -f "${TI_SECURE_DEV_PKG}/scripts/secure-binary-image.sh"; then
export TI_SECURE_DEV_PKG=${TI_SECURE_DEV_PKG}
${TI_SECURE_DEV_PKG}/scripts/secure-binary-image.sh $1 $2
else
cp $1 $2
fi
}
#
# Emit the fitImage ITS header
#
# $1 ... .its filename
fitimage_emit_fit_header() {
cat << EOF >> ${1}
/dts-v1/;
/ {
description = "U-Boot fitImage for ${DISTRO_NAME}/${PV}/${MACHINE}";
#address-cells = <1>;
EOF
}
#
# Emit the fitImage section bits
#
# $1 ... .its filename
# $2 ... Section bit type: imagestart - image section start
# confstart - configuration section start
# sectend - section end
# fitend - fitimage end
#
fitimage_emit_section_maint() {
case $2 in
imagestart)
cat << EOF >> ${1}
images {
EOF
;;
confstart)
cat << EOF >> ${1}
configurations {
EOF
;;
sectend)
cat << EOF >> ${1}
};
EOF
;;
fitend)
cat << EOF >> ${1}
};
EOF
;;
esac
}
#
# Emit the fitImage ITS kernel section
#
# $1 ... .its filename
# $2 ... Image counter
# $3 ... Path to kernel image
# $4 ... Compression type
fitimage_emit_section_kernel() {
kernel_csum=${FITIMAGE_HASH_ALGO}
ENTRYPOINT="${UBOOT_ENTRYPOINT}"
if test -n "${UBOOT_ENTRYSYMBOL}"; then
ENTRYPOINT=`${HOST_PREFIX}nm ${S}/vmlinux | \
awk '$4=="${UBOOT_ENTRYSYMBOL}" {print $2}'`
fi
cat << EOF >> ${1}
kernel-${2} {
description = "Linux kernel";
data = /incbin/("${3}");
type = "kernel";
arch = "${UBOOT_ARCH}";
os = "linux";
compression = "${4}";
load = <${UBOOT_LOADADDRESS}>;
entry = <${ENTRYPOINT}>;
EOF
if test -n "${FITIMAGE_HASH_ALGO}"; then
cat << EOF >> ${1}
hash-1 {
algo = "${kernel_csum}";
};
EOF
fi
cat << EOF >> ${1}
};
EOF
}
#
# Emit the fitImage ITS DTB section
#
# $1 ... .its filename
# $2 ... Image counter/name
# $3 ... Path to DTB image
# $4 ... Load address
fitimage_emit_section_dtb() {
dtb_csum=${FITIMAGE_HASH_ALGO}
dtb_loadline="${4}"
cat << EOF >> ${1}
${2} {
description = "Flattened Device Tree blob";
data = /incbin/("${3}");
type = "flat_dt";
arch = "${UBOOT_ARCH}";
compression = "none";
${dtb_loadline}
EOF
if test -n "${FITIMAGE_HASH_ALGO}"; then
cat << EOF >> ${1}
hash-1 {
algo = "${dtb_csum}";
};
EOF
fi
cat << EOF >> ${1}
};
EOF
}
#
# Emit the fitImage ITS TEE section
#
# $1 ... .its filename
# $2 ... Image counter/name
# $3 ... Path to TEE image
fitimage_emit_section_tee() {
tee_csum=${FITIMAGE_HASH_ALGO}
cat << EOF >> ${1}
${2} {
description = "OPTEE OS Image";
data = /incbin/("${3}");
type = "tee";
arch = "${UBOOT_ARCH}";
compression = "none";
EOF
if test -n "${FITIMAGE_HASH_ALGO}"; then
cat << EOF >> ${1}
hash-1 {
algo = "${tee_csum}";
};
EOF
fi
cat << EOF >> ${1}
};
EOF
}
#
# Emit the fitImage ITS setup section
#
# $1 ... .its filename
# $2 ... Image counter
# $3 ... Path to setup image
fitimage_emit_section_setup() {
setup_csum=${FITIMAGE_HASH_ALGO}
cat << EOF >> ${1}
setup-${2} {
description = "Linux setup.bin";
data = /incbin/("${3}");
type = "x86_setup";
arch = "${UBOOT_ARCH}";
os = "linux";
compression = "none";
load = <0x00090000>;
entry = <0x00090000>;
EOF
if test -n "${FITIMAGE_HASH_ALGO}"; then
cat << EOF >> ${1}
hash-1 {
algo = "${setup_csum}";
};
EOF
fi
cat << EOF >> ${1}
};
EOF
}
#
# Emit the fitImage ITS ramdisk section
#
# $1 ... .its filename
# $2 ... Image counter
# $3 ... Path to ramdisk image
fitimage_emit_section_ramdisk() {
ramdisk_csum=${FITIMAGE_HASH_ALGO}
ramdisk_ctype="none"
case $3 in
*.gz|*.gz.sec)
ramdisk_ctype="gzip"
;;
*.bz2|*.bz2.sec)
ramdisk_ctype="bzip2"
;;
*.lzma|*.lzma.sec)
ramdisk_ctype="lzma"
;;
*.lzo|*.lzo.sec)
ramdisk_ctype="lzo"
;;
*.lz4|*.lz4.sec)
ramdisk_ctype="lz4"
;;
esac
cat << EOF >> ${1}
ramdisk-${2} {
description = "ramdisk image";
data = /incbin/("${3}");
type = "ramdisk";
arch = "${UBOOT_ARCH}";
os = "linux";
compression = "${ramdisk_ctype}";
EOF
if test -n "${UBOOT_RD_LOADADDRESS}"; then
cat << EOF >> ${1}
load = <${UBOOT_RD_LOADADDRESS}>;
EOF
fi
if test -n "${UBOOT_RD_ENTRYPOINT}"; then
cat << EOF >> ${1}
entry = <${UBOOT_RD_ENTRYPOINT}>;
EOF
fi
if test -n "${FITIMAGE_HASH_ALGO}"; then
cat << EOF >> ${1}
hash-1 {
algo = "${ramdisk_csum}";
};
EOF
fi
cat << EOF >> ${1}
};
EOF
}
#
# Emit the fitImage ITS configuration section
#
# $1 ... .its filename
# $2 ... Linux kernel ID
# $3 ... DTB image ID/name
# $4 ... ramdisk ID
# $5 ... config ID
# $6 ... tee ID/name
fitimage_emit_section_config() {
conf_csum=${FITIMAGE_HASH_ALGO}
if [ -n "${UBOOT_SIGN_ENABLE}" ] ; then
conf_sign_keyname="${UBOOT_SIGN_KEYNAME}"
fi
sep=""
conf_desc=""
kernel_line=""
fdt_line=""
ramdisk_line=""
setup_line=""
default_line=""
if [ -n "${2}" ]; then
conf_desc="Linux kernel"
sep=", "
kernel_line="kernel = \"kernel-${2}\";"
fi
if [ -n "${3}" ]; then
conf_desc="${conf_desc}${sep}FDT blob"
sep=", "
fi
if [ -n "${4}" ]; then
conf_desc="${conf_desc}${sep}ramdisk"
sep=", "
ramdisk_line="ramdisk = \"ramdisk-${4}\";"
fi
if [ -n "${5}" ]; then
conf_desc="${conf_desc}${sep}setup"
sep=", "
setup_line="setup = \"setup-${5}\";"
fi
if [ -n "${6}" -a "x${FITIMAGE_PACK_TEE}" = "x1" ]; then
if [ "x${FITIMAGE_TEE_BY_NAME}" = "x1" ]; then
loadables_line="loadables = \"${6}.optee\";"
loadables_pager_line="loadables = \"${6}-pager.optee\";"
else
loadables_line="loadables = \"tee-${6}\";"
nextnum=`expr ${6} + 1`
loadables_pager_line="loadables = \"tee-${nextnum}\";"
fi
final_conf_desc="${conf_desc}${sep}OPTEE OS Image"
else
loadables_line=""
loadables_pager_line=""
final_conf_desc="${conf_desc}"
fi
dtbcount=1
for DTB in ${KERNEL_DEVICETREE}; do
DTB=$(basename "${DTB}")
dtb_ext=${DTB##*.}
if [ "x${FITIMAGE_CONF_BY_NAME}" = "x1" ] ; then
conf_name="${DTB}"
else
conf_name="conf-${dtbcount}"
fi
if [ "x${FITIMAGE_DTB_BY_NAME}" = "x1" ] ; then
fdt_line="fdt = \"${DTB}\";"
else
fdt_line="fdt = \"fdt-${dtbcount}\";"
fi
if [ "x${dtbcount}" = "x1" ]; then
cat << EOF >> ${1}
default = "${conf_name}";
EOF
fi
# Generate a single configuration section
cat << EOF >> ${1}
${conf_name} {
description = "${final_conf_desc}";
${fdt_line}
EOF
if [ "${dtb_ext}" != "dtbo" ]; then
cat << EOF >> ${1}
${kernel_line}
${ramdisk_line}
${setup_line}
${loadables_line}
EOF
fi
if test -n "${FITIMAGE_HASH_ALGO}"; then
cat << EOF >> ${1}
hash-1 {
algo = "${conf_csum}";
};
EOF
fi
if [ ! -z "${conf_sign_keyname}" ] ; then
sign_line="sign-images = \"kernel\""
if [ -n "${3}" ]; then
sign_line="${sign_line}, \"fdt\""
fi
if [ -n "${4}" ]; then
sign_line="${sign_line}, \"ramdisk\""
fi
if [ -n "${5}" ]; then
sign_line="${sign_line}, \"setup\""
fi
sign_line="${sign_line};"
cat << EOF >> ${1}
signature-1 {
algo = "${conf_csum},rsa2048";
key-name-hint = "${conf_sign_keyname}";
${sign_line}
};
EOF
fi
cat << EOF >> ${1}
};
EOF
# End single config section
# Generate a single "pager" configuration section
if [ "${OPTEEPAGER}" = "y" ]; then
if [ "x${FITIMAGE_CONF_BY_NAME}" = "x1" ] ; then
conf_name="${DTB}-pager"
else
conf_name="conf-${dtbcount}"
fi
cat << EOF >> ${1}
${conf_name} {
description = "${final_conf_desc}";
${fdt_line}
EOF
if [ "${dtb_ext}" != "dtbo" ]; then
cat << EOF >> ${1}
${kernel_line}
${ramdisk_line}
${setup_line}
${loadables_pager_line}
EOF
fi
if test -n "${FITIMAGE_HASH_ALGO}"; then
cat << EOF >> ${1}
hash-1 {
algo = "${conf_csum}";
};
EOF
fi
if [ ! -z "${conf_sign_keyname}" ] ; then
sign_line="sign-images = \"kernel\""
if [ -n "${3}" ]; then
sign_line="${sign_line}, \"fdt\""
fi
if [ -n "${4}" ]; then
sign_line="${sign_line}, \"ramdisk\""
fi
if [ -n "${5}" ]; then
sign_line="${sign_line}, \"setup\""
fi
sign_line="${sign_line};"
cat << EOF >> ${1}
signature-1 {
algo = "${conf_csum},rsa2048";
key-name-hint = "${conf_sign_keyname}";
${sign_line}
};
EOF
fi
cat << EOF >> ${1}
};
EOF
fi
# End single config section
dtbcount=`expr ${dtbcount} + 1`
done
}
#
# Assemble fitImage
#
# $1 ... .its filename
# $2 ... fitImage name
# $3 ... include ramdisk
fitimage_assemble() {
kernelcount=1
dtbcount=""
ramdiskcount=${3}
setupcount=""
teecount=1
rm -f ${1} arch/${ARCH}/boot/${2}
fitimage_emit_fit_header ${1}
#
# Step 1: Prepare a kernel image section.
#
fitimage_emit_section_maint ${1} imagestart
uboot_prep_kimage
fitimage_ti_secure linux.bin linux.bin.sec
fitimage_emit_section_kernel ${1} "${kernelcount}" linux.bin.sec "${linux_comp}"
#
# Step 2: Prepare a DTB image section
#
if test -n "${KERNEL_DEVICETREE}"; then
dtbcount=1
dtboaddress="${UBOOT_DTBO_LOADADDRESS}"
for DTB in ${KERNEL_DEVICETREE}; do
if echo ${DTB} | grep -q '/dts/'; then
bbwarn "${DTB} contains the full path to the the dts file, but only the dtb name should be used."
DTB=`basename ${DTB} | sed 's,\.dts$,.dtb,g'`
fi
DTB_PATH="arch/${ARCH}/boot/dts/${DTB}"
if [ ! -e "${DTB_PATH}" ]; then
DTB_PATH="arch/${ARCH}/boot/${DTB}"
fi
DTB=$(basename "${DTB}")
dtb_ext=${DTB##*.}
if [ "${dtb_ext}" = "dtbo" ]; then
if [ -n "${UBOOT_DTBO_LOADADDRESS}" ]; then
dtb_loadline="load = <${dtboaddress}>;"
num1=`printf "%d\n" ${dtboaddress}`
num2=`printf "%d\n" ${UBOOT_DTBO_OFFSET}`
num3=`expr $num1 + $num2`
dtboaddress=`printf "0x%x\n" $num3`
fi
elif [ -n "${UBOOT_DTB_LOADADDRESS}" ]; then
dtb_loadline="load = <${UBOOT_DTB_LOADADDRESS}>;"
fi
fitimage_ti_secure ${DTB_PATH} ${DTB_PATH}.sec
if [ "x${FITIMAGE_DTB_BY_NAME}" = "x1" ] ; then
fitimage_emit_section_dtb ${1} ${DTB} ${DTB_PATH}.sec "${dtb_loadline}"
else
fitimage_emit_section_dtb ${1} "fdt-${dtbcount}" ${DTB_PATH}.sec "${dtb_loadline}"
fi
if [ "x${dtbcount}" = "x1" ]; then
dtbref=${DTB}
fi
dtbcount=`expr ${dtbcount} + 1`
done
fi
#
# Step 2a: Prepare OP/TEE image section
#
if [ "x${FITIMAGE_PACK_TEE}" = "x1" ] ; then
mkdir -p ${B}/usr
rm -f ${B}/usr/${OPTEEFLAVOR}.optee
if [ -e "${DEPLOY_DIR_IMAGE}/${OPTEEFLAVOR}.optee" ]; then
cp ${DEPLOY_DIR_IMAGE}/${OPTEEFLAVOR}.optee ${B}/usr/.
fi
TEE_PATH="usr/${OPTEEFLAVOR}.optee"
fitimage_ti_secure ${TEE_PATH} ${TEE_PATH}.sec
if [ "x${FITIMAGE_TEE_BY_NAME}" = "x1" ] ; then
fitimage_emit_section_tee ${1} ${OPTEEFLAVOR}.optee ${TEE_PATH}.sec
else
fitimage_emit_section_tee ${1} "tee-${teecount}" ${TEE_PATH}.sec
fi
if [ "${OPTEEPAGER}" = "y" ]; then
teecount=`expr ${teecount} + 1`
rm -f ${B}/usr/${OPTEEFLAVOR}-pager.optee
if [ -e "${DEPLOY_DIR_IMAGE}/${OPTEEFLAVOR}-pager.optee" ]; then
cp ${DEPLOY_DIR_IMAGE}/${OPTEEFLAVOR}-pager.optee ${B}/usr/.
fi
TEE_PATH="usr/${OPTEEFLAVOR}-pager.optee"
fitimage_ti_secure ${TEE_PATH} ${TEE_PATH}.sec
if [ "x${FITIMAGE_TEE_BY_NAME}" = "x1" ] ; then
fitimage_emit_section_tee ${1} ${OPTEEFLAVOR}-pager.optee ${TEE_PATH}.sec
else
fitimage_emit_section_tee ${1} "tee-${teecount}" ${TEE_PATH}.sec
fi
fi
fi
#
# Step 3: Prepare a setup section. (For x86)
#
if test -e arch/${ARCH}/boot/setup.bin ; then
setupcount=1
fitimage_emit_section_setup ${1} "${setupcount}" arch/${ARCH}/boot/setup.bin
fi
#
# Step 4: Prepare a ramdisk section.
#
if [ "x${ramdiskcount}" = "x1" ] ; then
# Find and use the first initramfs image archive type we find
for img in cpio.lz4 cpio.lzo cpio.lzma cpio.xz cpio.gz cpio; do
initramfs_path="${DEPLOY_DIR_IMAGE}/${INITRAMFS_IMAGE}-${MACHINE}.${img}"
initramfs_local="usr/${INITRAMFS_IMAGE}-${MACHINE}.${img}"
echo "Using $initramfs_path"
if [ -e "${initramfs_path}" ]; then
fitimage_ti_secure ${initramfs_path} ${initramfs_local}.sec
fitimage_emit_section_ramdisk ${1} "${ramdiskcount}" ${initramfs_local}.sec
break
fi
done
fi
fitimage_emit_section_maint ${1} sectend
# Force the first Kernel and DTB in the default config
kernelcount=1
if test -n "${dtbcount}"; then
dtbcount=1
fi
teecount=1
#
# Step 5: Prepare a configurations section
#
fitimage_emit_section_maint ${1} confstart
if [ "x${FITIMAGE_DTB_BY_NAME}" != "x1" ] ; then
dtbref="fdt-${dtbcount}"
fi
if [ "x${FITIMAGE_TEE_BY_NAME}" = "x1" ] ; then
teeref="${OPTEEFLAVOR}"
else
teeref="${teecount}"
fi
fitimage_emit_section_config ${1} "${kernelcount}" "${dtbref}" "${ramdiskcount}" "${setupcount}" "${teeref}"
fitimage_emit_section_maint ${1} sectend
fitimage_emit_section_maint ${1} fitend
#
# Step 6: Assemble the image
#
uboot-mkimage \
${@'-D "${UBOOT_MKIMAGE_DTCOPTS}"' if len('${UBOOT_MKIMAGE_DTCOPTS}') else ''} \
-f ${1} \
arch/${ARCH}/boot/${2}
#
# Step 7: Sign the image and add public key to U-Boot dtb
#
if [ "x${UBOOT_SIGN_ENABLE}" = "x1" ] ; then
uboot-mkimage \
${@'-D "${UBOOT_MKIMAGE_DTCOPTS}"' if len('${UBOOT_MKIMAGE_DTCOPTS}') else ''} \
-F -k "${UBOOT_SIGN_KEYDIR}" \
-K "${DEPLOY_DIR_IMAGE}/${UBOOT_DTB_BINARY}" \
-r arch/${ARCH}/boot/${2}
fi
}
do_assemble_fitimage() {
if echo ${KERNEL_IMAGETYPES} | grep -wq "fitImage"; then
cd ${B}
fitimage_assemble fit-image.its fitImage
fi
}
addtask assemble_fitimage before do_install after do_compile
do_assemble_fitimage_initramfs() {
if echo ${KERNEL_IMAGETYPES} | grep -wq "fitImage" && \
test -n "${INITRAMFS_IMAGE}" ; then
cd ${B}
fitimage_assemble fit-image-${INITRAMFS_IMAGE}.its fitImage-${INITRAMFS_IMAGE} 1
fi
}
addtask assemble_fitimage_initramfs before do_deploy after do_install
FITIMAGE_ITS_SUFFIX ?= "its"
FITIMAGE_ITB_SUFFIX ?= "itb"
FITIMAGE_ITS_IMAGE ?= "fitImage-its-${PKGE}-${PKGV}-${PKGR}-${MACHINE}-${DATETIME}.${FITIMAGE_ITS_SUFFIX}"
FITIMAGE_ITS_IMAGE[vardepsexclude] = "DATETIME"
FITIMAGE_ITS_BINARY ?= "fitImage-its.${FITIMAGE_ITS_SUFFIX}"
FITIMAGE_ITS_SYMLINK ?= "fitImage-its-${MACHINE}.${FITIMAGE_ITS_SUFFIX}"
FITIMAGE_ITB_IMAGE ?= "fitImage-linux.bin-${PKGE}-${PKGV}-${PKGR}-${MACHINE}-${DATETIME}.${FITIMAGE_ITB_SUFFIX}"
FITIMAGE_ITB_IMAGE[vardepsexclude] = "DATETIME"
FITIMAGE_ITB_BINARY ?= "fitImage-linux.bin.${FITIMAGE_ITB_SUFFIX}"
FITIMAGE_ITB_SYMLINK ?= "fitImage-linux.bin-${MACHINE}.${FITIMAGE_ITB_SUFFIX}"
FITIMAGE_INITRAMFS_ITS_IMAGE ?= "fitImage-its-${INITRAMFS_IMAGE}-${PKGE}-${PKGV}-${PKGR}-${MACHINE}-${DATETIME}.${FITIMAGE_ITS_SUFFIX}"
FITIMAGE_INITRAMFS_ITS_IMAGE[vardepsexclude] = "DATETIME"
FITIMAGE_INITRAMFS_ITS_BINARY ?= "fitImage-its-${INITRAMFS_IMAGE}.${FITIMAGE_ITS_SUFFIX}"
FITIMAGE_INITRAMFS_ITS_SYMLINK ?= "fitImage-its-${INITRAMFS_IMAGE}-${MACHINE}.${FITIMAGE_ITS_SUFFIX}"
FITIMAGE_INITRAMFS_ITB_IMAGE ?= "fitImage-${INITRAMFS_IMAGE}-${PKGE}-${PKGV}-${PKGR}-${MACHINE}-${DATETIME}.${FITIMAGE_ITB_SUFFIX}"
FITIMAGE_INITRAMFS_ITB_IMAGE[vardepsexclude] = "DATETIME"
FITIMAGE_INITRAMFS_ITB_BINARY ?= "fitImage-${INITRAMFS_IMAGE}.${FITIMAGE_ITB_SUFFIX}"
FITIMAGE_INITRAMFS_ITB_SYMLINK ?= "fitImage-${INITRAMFS_IMAGE}-${MACHINE}.${FITIMAGE_ITB_SUFFIX}"
kernel_do_deploy:append() {
# Update deploy directory
if echo ${KERNEL_IMAGETYPES} | grep -wq "fitImage"; then
cd ${B}
echo "Copying fit-image.its source file..."
install -m 0644 fit-image.its ${DEPLOYDIR}/${FITIMAGE_ITS_IMAGE}
install -m 0644 arch/${ARCH}/boot/fitImage ${DEPLOYDIR}/${FITIMAGE_ITB_IMAGE}
if [ -n "${INITRAMFS_IMAGE}" ]; then
echo "Copying fit-image-${INITRAMFS_IMAGE}.its source file..."
install -m 0644 fit-image-${INITRAMFS_IMAGE}.its ${DEPLOYDIR}/${FITIMAGE_INITRAMFS_ITS_IMAGE}
install -m 0644 arch/${ARCH}/boot/fitImage-${INITRAMFS_IMAGE} ${DEPLOYDIR}/${FITIMAGE_INITRAMFS_ITB_IMAGE}
fi
cd ${DEPLOYDIR}
ln -sf ${FITIMAGE_ITS_IMAGE} ${FITIMAGE_ITS_SYMLINK}
ln -sf ${FITIMAGE_ITS_IMAGE} ${FITIMAGE_ITS_BINARY}
ln -sf ${FITIMAGE_ITB_IMAGE} ${FITIMAGE_ITB_SYMLINK}
ln -sf ${FITIMAGE_ITB_IMAGE} ${FITIMAGE_ITB_BINARY}
if [ -n "${INITRAMFS_IMAGE}" ]; then
ln -sf ${FITIMAGE_INITRAMFS_ITS_IMAGE} ${FITIMAGE_INITRAMFS_ITS_SYMLINK}
ln -sf ${FITIMAGE_INITRAMFS_ITS_IMAGE} ${FITIMAGE_INITRAMFS_ITS_BINARY}
ln -sf ${FITIMAGE_INITRAMFS_ITB_IMAGE} ${FITIMAGE_INITRAMFS_ITB_SYMLINK}
ln -sf ${FITIMAGE_INITRAMFS_ITB_IMAGE} ${FITIMAGE_INITRAMFS_ITB_BINARY}
fi
fi
}

View File

@@ -0,0 +1,214 @@
inherit ti-secdev
# The TI u-boot requires that the kernel image is signed. To not overload the
# entire kernel-fitimage.bbclass from oe-core, we just overwrite one function
# and do the signing in there.
#
# Assemble fitImage
#
# $1 ... .its filename
# $2 ... fitImage name
# $3 ... include ramdisk
fitimage_assemble() {
kernelcount=1
dtbcount=""
DTBS=""
ramdiskcount=$3
setupcount=""
bootscr_id=""
rm -f $1 arch/${ARCH}/boot/$2
if [ -n "${UBOOT_SIGN_IMG_KEYNAME}" -a "${UBOOT_SIGN_KEYNAME}" = "${UBOOT_SIGN_IMG_KEYNAME}" ]; then
bbfatal "Keys used to sign images and configuration nodes must be different."
fi
fitimage_emit_fit_header $1
#
# Step 1: Prepare a kernel image section.
#
fitimage_emit_section_maint $1 imagestart
uboot_prep_kimage
fitimage_ti_secure linux.bin linux.bin.sec
fitimage_emit_section_kernel $1 $kernelcount linux.bin.sec "$linux_comp"
#
# Step 2: Prepare a DTB image section
#
if [ -n "${KERNEL_DEVICETREE}" ]; then
dtbcount=1
for DTB in ${KERNEL_DEVICETREE}; do
if echo $DTB | grep -q '/dts/'; then
bbwarn "$DTB contains the full path to the the dts file, but only the dtb name should be used."
DTB=`basename $DTB | sed 's,\.dts$,.dtb,g'`
fi
# Skip ${DTB} if it's also provided in ${EXTERNAL_KERNEL_DEVICETREE}
if [ -n "${EXTERNAL_KERNEL_DEVICETREE}" ] && [ -s ${EXTERNAL_KERNEL_DEVICETREE}/${DTB} ]; then
continue
fi
DTB_PATH="arch/${ARCH}/boot/dts/$DTB"
if [ ! -e "$DTB_PATH" ]; then
DTB_PATH="arch/${ARCH}/boot/$DTB"
fi
DTB=$(echo "$DTB" | tr '/' '_')
# Skip DTB if we've picked it up previously
echo "$DTBS" | tr ' ' '\n' | grep -xq "$DTB" && continue
fitimage_ti_secure ${DTB_PATH} ${DTB_PATH}.sec
DTBS="$DTBS $DTB"
fitimage_emit_section_dtb $1 $DTB ${DTB_PATH}.sec
done
fi
if [ -n "${EXTERNAL_KERNEL_DEVICETREE}" ]; then
dtbcount=1
for DTB in $(find "${EXTERNAL_KERNEL_DEVICETREE}" -name '*.dtb' -printf '%P\n' | sort) \
$(find "${EXTERNAL_KERNEL_DEVICETREE}" -name '*.dtbo' -printf '%P\n' | sort); do
DTB=$(echo "$DTB" | tr '/' '_')
# Skip DTB/DTBO if we've picked it up previously
echo "$DTBS" | tr ' ' '\n' | grep -xq "$DTB" && continue
fitimage_ti_secure ${EXTERNAL_KERNEL_DEVICETREE}/${DTB} ${EXTERNAL_KERNEL_DEVICETREE}/${DTB}.sec
DTBS="$DTBS $DTB"
fitimage_emit_section_dtb $1 $DTB "${EXTERNAL_KERNEL_DEVICETREE}/${DTB}.sec"
done
fi
#
# Step 3: Prepare a u-boot script section
#
if [ -n "${UBOOT_ENV}" ] && [ -d "${STAGING_DIR_HOST}/boot" ]; then
if [ -e "${STAGING_DIR_HOST}/boot/${UBOOT_ENV_BINARY}" ]; then
cp ${STAGING_DIR_HOST}/boot/${UBOOT_ENV_BINARY} ${B}
bootscr_id="${UBOOT_ENV_BINARY}"
fitimage_emit_section_boot_script $1 "$bootscr_id" ${UBOOT_ENV_BINARY}
else
bbwarn "${STAGING_DIR_HOST}/boot/${UBOOT_ENV_BINARY} not found."
fi
fi
#
# Step 4: Prepare a setup section. (For x86)
#
if [ -e arch/${ARCH}/boot/setup.bin ]; then
setupcount=1
fitimage_emit_section_setup $1 $setupcount arch/${ARCH}/boot/setup.bin
fi
#
# Step 5: Prepare a ramdisk section.
#
if [ "x${ramdiskcount}" = "x1" ] && [ "${INITRAMFS_IMAGE_BUNDLE}" != "1" ]; then
# Find and use the first initramfs image archive type we find
found=
for img in ${FIT_SUPPORTED_INITRAMFS_FSTYPES}; do
initramfs_path="${DEPLOY_DIR_IMAGE}/${INITRAMFS_IMAGE_NAME}.$img"
initramfs_local="usr/${INITRAMFS_IMAGE_NAME}.$img"
if [ -e "$initramfs_path" ]; then
bbnote "Found initramfs image: $initramfs_path"
found=true
fitimage_ti_secure ${initramfs_path} ${initramfs_local}.sec
fitimage_emit_section_ramdisk $1 "$ramdiskcount" "${initramfs_local}.sec"
break
else
bbnote "Did not find initramfs image: $initramfs_path"
fi
done
if [ -z "$found" ]; then
bbfatal "Could not find a valid initramfs type for ${INITRAMFS_IMAGE_NAME}, the supported types are: ${FIT_SUPPORTED_INITRAMFS_FSTYPES}"
fi
fi
fitimage_emit_section_maint $1 sectend
# Force the first Kernel and DTB in the default config
kernelcount=1
if [ -n "$dtbcount" ]; then
dtbcount=1
fi
#
# Step 6: Prepare a configurations section
#
fitimage_emit_section_maint $1 confstart
# kernel-fitimage.bbclass currently only supports a single kernel (no less or
# more) to be added to the FIT image along with 0 or more device trees and
# 0 or 1 ramdisk.
# It is also possible to include an initramfs bundle (kernel and rootfs in one binary)
# When the initramfs bundle is used ramdisk is disabled.
# If a device tree is to be part of the FIT image, then select
# the default configuration to be used is based on the dtbcount. If there is
# no dtb present than select the default configuation to be based on
# the kernelcount.
if [ -n "$DTBS" ]; then
i=1
for DTB in ${DTBS}; do
dtb_ext=${DTB##*.}
if [ "$dtb_ext" = "dtbo" ]; then
fitimage_emit_section_config $1 "" "$DTB" "" "$bootscr_id" "" "`expr $i = $dtbcount`"
else
fitimage_emit_section_config $1 $kernelcount "$DTB" "$ramdiskcount" "$bootscr_id" "$setupcount" "`expr $i = $dtbcount`"
fi
i=`expr $i + 1`
done
else
defaultconfigcount=1
fitimage_emit_section_config $1 $kernelcount "" "$ramdiskcount" "$bootscr_id" "$setupcount" $defaultconfigcount
fi
fitimage_emit_section_maint $1 sectend
fitimage_emit_section_maint $1 fitend
#
# Step 7: Assemble the image
#
${UBOOT_MKIMAGE} \
${@'-D "${UBOOT_MKIMAGE_DTCOPTS}"' if len('${UBOOT_MKIMAGE_DTCOPTS}') else ''} \
-f $1 \
arch/${ARCH}/boot/$2
#
# Step 8: Sign the image and add public key to U-Boot dtb
#
if [ "x${UBOOT_SIGN_ENABLE}" = "x1" ] ; then
add_key_to_u_boot=""
if [ -n "${UBOOT_DTB_BINARY}" ]; then
# The u-boot.dtb is a symlink to UBOOT_DTB_IMAGE, so we need copy
# both of them, and don't dereference the symlink.
cp -P ${STAGING_DATADIR}/u-boot*.dtb ${B}
add_key_to_u_boot="-K ${B}/${UBOOT_DTB_BINARY}"
fi
${UBOOT_MKIMAGE_SIGN} \
${@'-D "${UBOOT_MKIMAGE_DTCOPTS}"' if len('${UBOOT_MKIMAGE_DTCOPTS}') else ''} \
-F -k "${UBOOT_SIGN_KEYDIR}" \
$add_key_to_u_boot \
-r arch/${ARCH}/boot/$2 \
${UBOOT_MKIMAGE_SIGN_ARGS}
fi
}
fitimage_ti_secure() {
if test -n "${TI_SECURE_DEV_PKG}"; then
export TI_SECURE_DEV_PKG=${TI_SECURE_DEV_PKG}
${TI_SECURE_DEV_PKG}/scripts/secure-binary-image.sh $1 $2
else
cp $1 $2
fi
}

View File

@@ -0,0 +1,21 @@
# Helper class to prepare correct environment for signing with TI Security Development Tools
# K3 SECDEV scripts use OpenSSL
DEPENDS:append:k3 = " openssl-native"
DEPENDS:append:k3r5 = " openssl-native"
# Use package version of TI SECDEV for K3 if one is not provided through the environment
DEPENDS:append:k3 = "${@ '' if d.getVar('TI_SECURE_DEV_PKG_K3') else ' ti-k3-secdev-native' }"
DEPENDS:append:k3r5 = "${@ '' if d.getVar('TI_SECURE_DEV_PKG_K3') else ' ti-k3-secdev-native' }"
TI_K3_SECDEV_INSTALL_DIR = "${STAGING_DIR_NATIVE}${datadir}/ti/ti-k3-secdev"
TI_SECURE_DEV_PKG:k3 = "${@ d.getVar('TI_SECURE_DEV_PKG_K3') or d.getVar('TI_K3_SECDEV_INSTALL_DIR') }"
TI_SECURE_DEV_PKG:k3r5 = "${@ d.getVar('TI_SECURE_DEV_PKG_K3') or d.getVar('TI_K3_SECDEV_INSTALL_DIR') }"
# For non-K3 we require the SECDEV tools be provided through the environment with the following vars
TI_SECURE_DEV_PKG:ti33x = "${TI_SECURE_DEV_PKG_CAT}/am3x"
TI_SECURE_DEV_PKG:ti43x = "${TI_SECURE_DEV_PKG_CAT}/am4x"
TI_SECURE_DEV_PKG:am57xx = "${TI_SECURE_DEV_PKG_AUTO}/am5x"
TI_SECURE_DEV_PKG:dra7xx = "${TI_SECURE_DEV_PKG_AUTO}/dra7"
# The SECDEV scripts may need their own location provided through the environment
export TI_SECURE_DEV_PKG

View File

@@ -0,0 +1,131 @@
# This file is part of U-Boot verified boot support and is intended to be
# inherited from u-boot recipe and from kernel-fitimage.bbclass.
#
# The signature procedure requires the user to generate an RSA key and
# certificate in a directory and to define the following variable:
#
# UBOOT_SIGN_KEYDIR = "/keys/directory"
# UBOOT_SIGN_KEYNAME = "dev" # keys name in keydir (eg. "dev.crt", "dev.key")
# UBOOT_MKIMAGE_DTCOPTS = "-I dts -O dtb -p 2000"
# UBOOT_SIGN_ENABLE = "1"
#
# As verified boot depends on fitImage generation, following is also required:
#
# KERNEL_CLASSES ?= " kernel-fitimage "
# KERNEL_IMAGETYPE ?= "fitImage"
#
# The signature support is limited to the use of CONFIG_OF_SEPARATE in U-Boot.
#
# The tasks sequence is set as below, using DEPLOY_IMAGE_DIR as common place to
# treat the device tree blob:
#
# * u-boot:do_install:append
# Install UBOOT_DTB_BINARY to datadir, so that kernel can use it for
# signing, and kernel will deploy UBOOT_DTB_BINARY after signs it.
#
# * virtual/kernel:do_assemble_fitimage
# Sign the image
#
# * u-boot:do_deploy[postfuncs]
# Deploy files like UBOOT_DTB_IMAGE, UBOOT_DTB_SYMLINK and others.
#
# For more details on signature process, please refer to U-Boot documentation.
# Signature activation.
UBOOT_SIGN_ENABLE ?= "0"
# Default value for deployment filenames.
UBOOT_DTB_IMAGE ?= "u-boot-${MACHINE}-${PV}-${PR}.dtb"
UBOOT_DTB_BINARY ?= "u-boot.dtb"
UBOOT_DTB_SYMLINK ?= "u-boot-${MACHINE}.dtb"
UBOOT_NODTB_IMAGE ?= "u-boot-nodtb-${MACHINE}-${PV}-${PR}.${UBOOT_SUFFIX}"
UBOOT_NODTB_BINARY ?= "u-boot-nodtb.${UBOOT_SUFFIX}"
UBOOT_NODTB_SYMLINK ?= "u-boot-nodtb-${MACHINE}.${UBOOT_SUFFIX}"
# Functions in this bbclass is for u-boot only
UBOOT_PN = "${@d.getVar('PREFERRED_PROVIDER_u-boot') or 'u-boot'}"
concat_dtb_helper() {
if [ -e "${UBOOT_DTB_BINARY}" ]; then
ln -sf ${UBOOT_DTB_IMAGE} ${DEPLOYDIR}/${UBOOT_DTB_BINARY}
ln -sf ${UBOOT_DTB_IMAGE} ${DEPLOYDIR}/${UBOOT_DTB_SYMLINK}
fi
if [ -f "${UBOOT_NODTB_BINARY}" ]; then
install ${UBOOT_NODTB_BINARY} ${DEPLOYDIR}/${UBOOT_NODTB_IMAGE}
ln -sf ${UBOOT_NODTB_IMAGE} ${DEPLOYDIR}/${UBOOT_NODTB_SYMLINK}
ln -sf ${UBOOT_NODTB_IMAGE} ${DEPLOYDIR}/${UBOOT_NODTB_BINARY}
fi
# Concatenate U-Boot w/o DTB & DTB with public key
# (cf. kernel-fitimage.bbclass for more details)
deployed_uboot_dtb_binary='${DEPLOY_DIR_IMAGE}/${UBOOT_DTB_IMAGE}'
if [ "x${UBOOT_SUFFIX}" = "ximg" -o "x${UBOOT_SUFFIX}" = "xrom" ] && \
[ -e "$deployed_uboot_dtb_binary" ]; then
oe_runmake EXT_DTB=$deployed_uboot_dtb_binary
install ${UBOOT_BINARY} ${DEPLOYDIR}/${UBOOT_IMAGE}
elif [ -e "${DEPLOYDIR}/${UBOOT_NODTB_IMAGE}" -a -e "$deployed_uboot_dtb_binary" ]; then
cd ${DEPLOYDIR}
cat ${UBOOT_NODTB_IMAGE} $deployed_uboot_dtb_binary | tee ${B}/${CONFIG_B_PATH}/${UBOOT_BINARY} > ${UBOOT_IMAGE}
else
bbwarn "Failure while adding public key to u-boot binary. Verified boot won't be available."
fi
}
concat_dtb() {
if [ "${UBOOT_SIGN_ENABLE}" = "1" -a "${PN}" = "${UBOOT_PN}" -a -n "${UBOOT_DTB_BINARY}" ]; then
mkdir -p ${DEPLOYDIR}
if [ -n "${UBOOT_CONFIG}" ]; then
for config in ${UBOOT_MACHINE}; do
CONFIG_B_PATH="${config}"
cd ${B}/${config}
concat_dtb_helper
done
else
CONFIG_B_PATH=""
cd ${B}
concat_dtb_helper
fi
fi
}
# Install UBOOT_DTB_BINARY to datadir, so that kernel can use it for
# signing, and kernel will deploy UBOOT_DTB_BINARY after signs it.
install_helper() {
if [ -f "${UBOOT_DTB_BINARY}" ]; then
install -d ${D}${datadir}
# UBOOT_DTB_BINARY is a symlink to UBOOT_DTB_IMAGE, so we
# need both of them.
install ${UBOOT_DTB_BINARY} ${D}${datadir}/${UBOOT_DTB_IMAGE}
ln -sf ${UBOOT_DTB_IMAGE} ${D}${datadir}/${UBOOT_DTB_BINARY}
else
bbwarn "${UBOOT_DTB_BINARY} not found"
fi
}
do_install:append() {
if [ "${UBOOT_SIGN_ENABLE}" = "1" -a "${PN}" = "${UBOOT_PN}" -a -n "${UBOOT_DTB_BINARY}" ]; then
if [ -n "${UBOOT_CONFIG}" ]; then
for config in ${UBOOT_MACHINE}; do
cd ${B}/${config}
install_helper
done
else
cd ${B}
install_helper
fi
fi
}
python () {
if d.getVar('UBOOT_SIGN_ENABLE') == '1' and d.getVar('PN') == d.getVar('UBOOT_PN') and d.getVar('UBOOT_DTB_BINARY'):
kernel_pn = d.getVar('PREFERRED_PROVIDER_virtual/kernel')
# Make "bitbake u-boot -cdeploy" deploys the signed u-boot.dtb
d.appendVarFlag('do_deploy', 'depends', ' %s:do_deploy' % kernel_pn)
# kernerl's do_deploy is a litle special, so we can't use
# do_deploy:append, otherwise it would override
# kernel_do_deploy.
d.appendVarFlag('do_deploy', 'prefuncs', ' concat_dtb')
}

View File

@@ -9,7 +9,7 @@ BBFILE_COLLECTIONS += "meta-ti-bsp"
BBFILE_PATTERN_meta-ti-bsp := "^${LAYERDIR}/"
BBFILE_PRIORITY_meta-ti-bsp = "6"
LAYERSERIES_COMPAT_meta-ti-bsp = "kirkstone langdale"
LAYERSERIES_COMPAT_meta-ti-bsp = "kirkstone langdale mickledore"
LICENSE_PATH += "${LAYERDIR}/licenses"
@@ -19,8 +19,7 @@ LAYERDEPENDS_meta-ti-bsp = " \
"
SIGGEN_EXCLUDERECIPES_ABISAFE += " \
ti-sgx-ddk-km \
ti-sgx-ddk-um \
mesa-pvr \
"
HOSTTOOLS_NONFATAL += "truncate xxd comm"

View File

@@ -23,7 +23,7 @@ SERIAL_CONSOLES_CHECK = "${SERIAL_CONSOLES}"
# UBI: logical eraseblock size: 126976 bytes
# from ubiattach stdout:
# UBI device number 0, total 1988 LEBs
MKUBIFS_ARGS ?= "-F -m 2048 -e 126976 -c 9900"
MKUBIFS_ARGS ?= "-F -m 2048 -e 126976 -c 12000"
# do ubiattach /dev/ubi_ctrl -m 7 -O 2048
# from dmesg:

View File

@@ -15,4 +15,12 @@ UBOOT_LOADADDRESS = "0x82000000"
UBOOT_RD_LOADADDRESS = "0x84000000"
UBOOT_RD_ENTRYPOINT = "0x84000000"
TI_SECURE_DEV_PKG = "${TI_SECURE_DEV_PKG_CAT}/am3x"
# FIT image for legacy secure devices
KERNEL_CLASSES += " kernel-fitimage-legacyhs"
KERNEL_IMAGETYPES += " fitImage"
# FIT image settings
FITIMAGE_HASH_ALGO = ""
FITIMAGE_DTB_BY_NAME = "1"
FITIMAGE_TEE_BY_NAME = "1"
FITIMAGE_CONF_BY_NAME = "1"

View File

@@ -21,7 +21,7 @@ SERIAL_CONSOLES = "115200;ttyS0"
# UBI: logical eraseblock size: 253952 bytes
# from ubiattach stdout:
# UBI device number 0, total 994 LEBs
MKUBIFS_ARGS = "-F -m 4096 -e 253952 -c 4800"
MKUBIFS_ARGS = "-F -m 4096 -e 253952 -c 5500"
# do ubiattach /dev/ubi_ctrl -m 11 -O 4096
# from dmesg:

View File

@@ -11,10 +11,18 @@ UBOOT_LOADADDRESS = "0x82000000"
UBOOT_RD_LOADADDRESS = "0x84000000"
UBOOT_RD_ENTRYPOINT = "0x84000000"
TI_SECURE_DEV_PKG = "${TI_SECURE_DEV_PKG_CAT}/am4x"
OPTEEMACHINE = "ti-am43xx"
OPTEEFLAVOR = "am43xx"
OPTEEOUTPUTMACHINE = "ti"
EXTRA_IMAGEDEPENDS += "optee-os"
# FIT image for legacy secure devices
KERNEL_CLASSES += " kernel-fitimage-legacyhs"
KERNEL_IMAGETYPES += " fitImage"
# FIT image settings
FITIMAGE_HASH_ALGO = ""
FITIMAGE_PACK_TEE = "1"
FITIMAGE_DTB_BY_NAME = "1"
FITIMAGE_TEE_BY_NAME = "1"
FITIMAGE_CONF_BY_NAME = "1"

View File

@@ -2,34 +2,34 @@
#@NAME: AM57xx EVM
#@DESCRIPTION: Machine configuration for the TI AM57xx EVM
require conf/machine/include/dra7xx.inc
require conf/machine/include/am57xx.inc
MACHINE_FEATURES += "touchscreen"
SERIAL_CONSOLES = "115200;ttyS2"
KERNEL_DEVICETREE_PREFIX = " \
am57 \
ti/am57 \
ti/lcd \
ti/ov10635 \
"
KERNEL_DEVICETREE_DTBMERGE = " \
am57xx-evm.dtb \
am57xx-evm-reva3.dtb \
"
KERNEL_DEVICETREE = " \
am57xx-beagle-x15.dtb \
am57xx-beagle-x15-revb1.dtb \
am57xx-beagle-x15-revc.dtb \
am5729-beagleboneai.dtb \
${@oe.utils.conditional('PREFERRED_PROVIDER_virtual/kernel', 'linux-ti-mainline', '', 'am57xx-evm.dtb', d)} \
ti/am57xx-evm-common.dtbo \
${@oe.utils.conditional('PREFERRED_PROVIDER_virtual/kernel', 'linux-ti-mainline', '', 'am57xx-evm-reva3.dtb', d)} \
ti/am57xx-evm-reva3.dtbo \
am571x-idk.dtb \
ti/am571x-idk-touchscreen.dtbo \
am572x-idk.dtb \
am574x-idk.dtb \
ti/am57xx-idk-osd-lcd-common.dtbo \
ti/am572x-idk-touchscreen.dtbo \
ti/lcd-osd101t2587.dtbo \
ti/lcd-osd101t2045.dtbo \
${@oe.utils.conditional('PREFERRED_PROVIDER_virtual/kernel', 'linux-ti-mainline', '', 'ti/ov10635.dtbo', d)} \
"
KERNEL_DEVICETREE += "${@oe.utils.conditional('ENABLE_TI_UIO_DEVICES', '1', 'am574x-idk-pru-excl-uio.dtb am572x-idk-pru-excl-uio.dtb am571x-idk-pru-excl-uio.dtb', '', d)}"
UBOOT_MACHINE = "am57xx_evm_config"
# UBI information. Note that this is board and kernel specific. Changes

View File

@@ -11,11 +11,19 @@ UBOOT_LOADADDRESS = "0x82000000"
UBOOT_RD_LOADADDRESS = "0x84000000"
UBOOT_RD_ENTRYPOINT = "0x84000000"
TI_SECURE_DEV_PKG = "${TI_SECURE_DEV_PKG_AUTO}/am5x"
OPTEEMACHINE = "ti-am57xx"
OPTEEFLAVOR = "am57xx"
OPTEEOUTPUTMACHINE = "ti"
OPTEEPAGER = "y"
EXTRA_IMAGEDEPENDS += "optee-os"
# FIT image for legacy secure devices
KERNEL_CLASSES += " kernel-fitimage-legacyhs"
KERNEL_IMAGETYPES += " fitImage"
# FIT image settings
FITIMAGE_HASH_ALGO = ""
FITIMAGE_PACK_TEE = "1"
FITIMAGE_DTB_BY_NAME = "1"
FITIMAGE_TEE_BY_NAME = "1"
FITIMAGE_CONF_BY_NAME = "1"

View File

@@ -0,0 +1,11 @@
#@TYPE: Machine
#@NAME: AM62A HS-FS EVM (R5F)
#@DESCRIPTION: Machine configuration for the TI AM62A EVM (R5F core)
require conf/machine/include/k3r5.inc
SYSFW_SOC = "am62ax"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs-fs"
UBOOT_MACHINE = "am62ax_evm_r5_defconfig"

View File

@@ -0,0 +1,16 @@
#@TYPE: Machine
#@NAME: AM62AXX EVM
#@DESCRIPTION: Machine configuration for the TI AM62AXX EVM
require conf/machine/include/am62axx.inc
KERNEL_DEVICETREE_PREFIX = " \
ti/k3-am62a7 \
ti/k3-fpdlink \
"
KERNEL_DEVICETREE = " \
ti/k3-am62a7-sk.dtb \
"
UBOOT_MACHINE = "am62ax_evm_a53_defconfig"

View File

@@ -3,9 +3,10 @@
#@DESCRIPTION: Machine configuration for the TI AM62xx EVM (R5F core)
require conf/machine/include/k3r5.inc
require conf/machine/include/ti-extras.inc
SYSFW_SOC = "am62x"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "gp"
SYSFW_SUFFIX = "hs-fs"
UBOOT_MACHINE = "am62x_evm_r5_defconfig"

View File

@@ -3,12 +3,12 @@
#@DESCRIPTION: Machine configuration for the TI AM62XX EVM
require conf/machine/include/am62xx.inc
require conf/machine/include/ti-extras.inc
KERNEL_DEVICETREE_PREFIX = "ti/k3-am625"
KERNEL_DEVICETREE = " \
ti/k3-am625-sk.dtb \
ti/k3-am625-skeleton.dtb \
ti/k3-am625-sk-lpmdemo.dtb \
ti/k3-am625-sk-csi2-ov5640.dtbo \
"
UBOOT_MACHINE = "am62x_evm_a53_defconfig"

View File

@@ -0,0 +1,11 @@
#@TYPE: Machine
#@NAME: AM62XX LP GP EVM (R5F)
#@DESCRIPTION: Machine configuration for the TI AM62xx LP GP EVM (R5F core)
require conf/machine/include/k3r5.inc
SYSFW_SOC = "am62x"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs-fs"
UBOOT_MACHINE = "am62x_lpsk_r5_defconfig"

View File

@@ -0,0 +1,16 @@
#@TYPE: Machine
#@NAME: AM62XX LP EVM
#@DESCRIPTION: Machine configuration for the TI AM62XX LP EVM
require conf/machine/include/am62xx.inc
KERNEL_DEVICETREE_PREFIX = " \
ti/k3-am62-lp \
ti/k3-am625-sk \
"
KERNEL_DEVICETREE = " \
ti/k3-am62-lp-sk.dtb \
"
UBOOT_MACHINE = "am62x_lpsk_a53_defconfig"

View File

@@ -4,8 +4,8 @@
require conf/machine/include/k3r5.inc
SYSFW_SOC = "am64x"
SYSFW_SOC = "am64x_sr2"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "gp"
SYSFW_SUFFIX = "hs-fs"
UBOOT_MACHINE = "am64x_evm_r5_defconfig"

View File

@@ -1,14 +0,0 @@
#@TYPE: Machine
#@NAME: AM64xx HS EVM (R5F)
#@DESCRIPTION: Machine configuration for the TI AM64xx HS EVM (R5F core)
require conf/machine/include/k3r5.inc
SYSFW_SOC = "am64x"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs"
SYSFW_SYMLINK = ""
UBOOT_MACHINE = "am64x_hs_evm_r5_defconfig"
TI_SECURE_DEV_PKG = "${TI_SECURE_DEV_PKG_K3}"

View File

@@ -1,21 +0,0 @@
#@TYPE: Machine
#@NAME: AM64xx HS EVM
#@DESCRIPTION: Machine configuration for the TI AM64xx HS EVM
require conf/machine/include/am64xx.inc
UBOOT_MACHINE = "am64x_hs_evm_a53_defconfig"
UBOOT_ENTRYPOINT = "0x80080000"
UBOOT_LOADADDRESS = "0x80080000"
UBOOT_RD_LOADADDRESS = "0x84000000"
UBOOT_RD_ENTRYPOINT = "0x84000000"
UBOOT_DTB_LOADADDRESS = "0x83000000"
UBOOT_DTBO_LOADADDRESS = "0x83080000"
UBOOT_DTBO_OFFSET = "0x00010000"
SPL_BINARY = "tispl.bin_HS"
UBOOT_BINARY = "u-boot.img_HS"
UBOOT_SYMLINK = "u-boot.img"
TI_SECURE_DEV_PKG = "${TI_SECURE_DEV_PKG_K3}"

View File

@@ -1,11 +0,0 @@
#@TYPE: Machine
#@NAME: AM65xx SR2.0 EVM (R5F)
#@DESCRIPTION: Machine configuration for the TI AM65xx SR2.0 EVM (R5F core)
# Booting SR2 requires different SYSFW, the rest is handled at runtime
require conf/machine/am65xx-evm-k3r5.conf
SOC_FAMILY:append = ":k3r5-sr2"
SYSFW_SOC = "am65x_sr2"
SYSFW_SYMLINK = "sysfw.itb"

View File

@@ -4,9 +4,8 @@
require conf/machine/include/k3r5.inc
SYSFW_SOC = "am65x"
SYSFW_SOC = "am65x_sr2"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "gp"
SYSFW_SYMLINK = ""
UBOOT_MACHINE = "am65x_evm_r5_defconfig"

View File

@@ -1,11 +0,0 @@
#@TYPE: Machine
#@NAME: AM65xx SR2.0 HS EVM (R5F)
#@DESCRIPTION: Machine configuration for the TI AM65xx SR2.0 HS EVM (R5F core)
# Booting SR2 requires different SYSFW, the rest is handled at runtime
require conf/machine/am65xx-hs-evm-k3r5.conf
SOC_FAMILY:append = ":k3r5-sr2"
SYSFW_SOC = "am65x_sr2"
SYSFW_SYMLINK = "sysfw.itb"

View File

@@ -4,11 +4,8 @@
require conf/machine/include/k3r5.inc
SYSFW_SOC = "am65x"
SYSFW_SOC = "am65x_sr2"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs"
SYSFW_SYMLINK = ""
UBOOT_MACHINE = "am65x_hs_evm_r5_defconfig"
TI_SECURE_DEV_PKG = "${TI_SECURE_DEV_PKG_K3}"

View File

@@ -5,17 +5,3 @@
require conf/machine/include/am65xx.inc
UBOOT_MACHINE = "am65x_hs_evm_a53_defconfig"
UBOOT_ENTRYPOINT = "0x80080000"
UBOOT_LOADADDRESS = "0x80080000"
UBOOT_RD_LOADADDRESS = "0x84000000"
UBOOT_RD_ENTRYPOINT = "0x84000000"
UBOOT_DTB_LOADADDRESS = "0x83000000"
UBOOT_DTBO_LOADADDRESS = "0x83080000"
UBOOT_DTBO_OFFSET = "0x00010000"
SPL_BINARY = "tispl.bin_HS"
UBOOT_BINARY = "u-boot.img_HS"
UBOOT_SYMLINK = "u-boot.img"
TI_SECURE_DEV_PKG = "${TI_SECURE_DEV_PKG_K3}"

View File

@@ -2,9 +2,17 @@
#@NAME: BeagleBoard X15
#@DESCRIPTION: Machine configuration for the BeagleBoard X15
require conf/machine/include/dra7xx.inc
require conf/machine/include/am57xx.inc
KERNEL_DEVICETREE = "am57xx-beagle-x15.dtb am57xx-beagle-x15-revb1.dtb am57xx-beagle-x15-revc.dtb"
PREFERRED_PROVIDER_virtual/kernel = "linux-bb.org"
KERNEL_DEVICETREE_PREFIX = "am57xx-beagle-x15"
KERNEL_DEVICETREE = " \
am57xx-beagle-x15.dtb \
am57xx-beagle-x15-revb1.dtb \
am57xx-beagle-x15-revc.dtb \
"
MACHINE_GUI_CLASS = "bigscreen"

View File

@@ -0,0 +1,17 @@
#@TYPE: Machine
#@NAME: BeagleBone AI-64 (R5F)
#@DESCRIPTION: Machine configuration for the BeagleBone AI-64 (R5F core)
require conf/machine/include/k3r5.inc
SYSFW_SOC = "j721e"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "gp"
SPL_BINARY = "spl/u-boot-spl.${UBOOT_SUFFIX}"
SPL_SYMLINK = "u-boot-r5spl.${UBOOT_SUFFIX}"
UBOOT_BINARY = "tiboot3.${UBOOT_SUFFIX}"
UBOOT_IMAGE = "tiboot3-${MAINMACHINE}-${PV}-${PR}.${UBOOT_SUFFIX}"
UBOOT_SYMLINK = "tiboot3-${MAINMACHINE}.${UBOOT_SUFFIX}"
UBOOT_MACHINE = "j721e_evm_r5_defconfig"

View File

@@ -0,0 +1,72 @@
#@TYPE: Machine
#@NAME: BeagleBone AI-64 (A72)
#@DESCRIPTION: Machine configuration for the BeagleBone AI-64 board (A72 core)
require conf/machine/include/j721e.inc
UBOOT_MACHINE = "j721e_evm_a72_config"
PREFERRED_PROVIDER_virtual/kernel = "linux-bb.org"
KERNEL_DEVICETREE = " \
ti/k3-j721e-beagleboneai64.dtb \
ti/k3-j721e-beagleboneai64-no-shared-mem.dtb \
ti/k3-j721e-common-proc-board.dtb \
ti/k3-j721e-common-proc-board-infotainment.dtbo \
ti/k3-j721e-common-proc-board-uarts.dtbo \
ti/k3-j721e-cpb-csi2-ov5640.dtbo \
ti/k3-j721e-fpdlink-cpb-fusion.dtbo \
ti/k3-j721e-fpdlink-imx390-cm-0-0.dtbo \
ti/k3-j721e-fpdlink-imx390-cm-0-1.dtbo \
ti/k3-j721e-fpdlink-imx390-cm-0-2.dtbo \
ti/k3-j721e-fpdlink-imx390-cm-0-3.dtbo \
ti/k3-j721e-fpdlink-imx390-cm-1-0.dtbo \
ti/k3-j721e-fpdlink-imx390-cm-1-1.dtbo \
ti/k3-j721e-fpdlink-imx390-cm-1-2.dtbo \
ti/k3-j721e-fpdlink-imx390-cm-1-3.dtbo \
ti/k3-j721e-fpdlink-imx390-rcm-0-0.dtbo \
ti/k3-j721e-fpdlink-imx390-rcm-0-1.dtbo \
ti/k3-j721e-fpdlink-imx390-rcm-0-2.dtbo \
ti/k3-j721e-fpdlink-imx390-rcm-0-3.dtbo \
ti/k3-j721e-fpdlink-imx390-rcm-1-0.dtbo \
ti/k3-j721e-fpdlink-imx390-rcm-1-1.dtbo \
ti/k3-j721e-fpdlink-imx390-rcm-1-2.dtbo \
ti/k3-j721e-fpdlink-imx390-rcm-1-3.dtbo \
ti/k3-j721e-fpdlink-sk-fusion.dtbo \
ti/k3-j721e-gesi-exp-board.dtbo \
ti/k3-j721e-proc-board-tps65917.dtb \
ti/k3-j721e-quad-port-eth-exp.dtbo \
ti/k3-j721e-sk-csi2-ov5640.dtbo \
ti/k3-j721e-sk.dtb \
ti/k3-j721e-sk-rpi-cam-imx219.dtbo \
ti/k3-j721e-sk-rpi-hdr-ehrpwm.dtbo \
ti/overlays/BBAI64-CSI0-imx219.dtbo \
ti/overlays/BBAI64-CSI1-imx219.dtbo \
ti/overlays/BBAI64-DSI-RPi-7inch-panel.dtbo \
ti/overlays/BBAI64-P8_37-ehrpwm5_a.dtbo \
ti/overlays/BBAI64-P9_25-ehrpwm4_b.dtbo \
ti/overlays/BB-I2C2-MPU6050.dtbo \
ti/overlays/BBORG_LOAD-00A2.dtbo \
ti/overlays/BBORG_RELAY-00A2.dtbo \
ti/overlays/BBORG_SERVO-00A2.dtbo \
ti/overlays/BONE-FAN.dtbo \
ti/overlays/BONE-I2C1.dtbo \
ti/overlays/BONE-I2C2.dtbo \
ti/overlays/BONE-I2C3.dtbo \
ti/overlays/BONE-LED_P8_03.dtbo \
ti/overlays/BONE-LED_P9_11.dtbo \
ti/overlays/BONE-PWM0.dtbo \
ti/overlays/BONE-PWM1.dtbo \
ti/overlays/BONE-PWM2.dtbo \
ti/overlays/BONE-SPI0_0.dtbo \
ti/overlays/BONE-SPI0_1.dtbo \
ti/overlays/BONE-SPI1_0.dtbo \
ti/overlays/BONE-UART1.dtbo \
ti/overlays/BONE-USB0-host.dtbo \
ti/overlays/J721E-PRU-UIO-00A0.dtbo \
ti/overlays/k3-j721e-beagleboneai64-RPi-7inch-panel.dtbo \
ti/overlays/robotics-cape.dtbo \
"
MACHINE_GUI_CLASS = "bigscreen"
MACHINE_ESSENTIAL_EXTRA_RDEPENDS += "kernel-devicetree kernel-image-image"

View File

@@ -4,9 +4,18 @@
require conf/machine/include/ti33x.inc
KERNEL_DEVICETREE = "am335x-bone.dtb am335x-boneblue.dtb \
am335x-boneblack.dtb am335x-boneblack-wireless.dtb \
am335x-bonegreen.dtb am335x-bonegreen-wireless.dtb"
PREFERRED_PROVIDER_virtual/kernel = "linux-bb.org"
KERNEL_DEVICETREE_PREFIX = "am335x-bone"
KERNEL_DEVICETREE = " \
am335x-bone.dtb \
am335x-boneblue.dtb \
am335x-boneblack.dtb \
am335x-boneblack-wireless.dtb \
am335x-bonegreen.dtb \
am335x-bonegreen-wireless.dtb \
"
MACHINE_GUI_CLASS = "bigscreen"
MACHINE_FEATURES += "screen"

View File

@@ -0,0 +1,11 @@
#@TYPE: Machine
#@NAME: BeaglePlay (R5F)
#@DESCRIPTION: Machine configuration for the BeaglePlay (R5F core)
require conf/machine/include/k3r5.inc
SYSFW_SOC = "am62x"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "gp"
UBOOT_MACHINE = "am62x_evm_r5_defconfig"

View File

@@ -0,0 +1,69 @@
#@TYPE: Machine
#@NAME: BeaglePlay (A53)
#@DESCRIPTION: Machine configuration for the BeaglePlay board (A53 core)
require conf/machine/include/k3.inc
SOC_FAMILY:append = ":am62xx"
MACHINE_FEATURES += "screen gpu"
SERIAL_CONSOLES = "115200;ttyS2"
SERIAL_CONSOLES_CHECK = "${SERIAL_CONSOLES}"
require conf/machine/include/mesa-pvr.inc
PREFERRED_PROVIDER_virtual/gpudriver ?= "ti-img-rogue-driver"
TFA_BOARD = "lite"
TFA_K3_SYSTEM_SUSPEND = "1"
OPTEEMACHINE = "k3-am62x"
UBOOT_MACHINE = "am62x_evm_a53_defconfig"
PREFERRED_PROVIDER_virtual/kernel = "linux-bb.org"
KERNEL_DEVICETREE = " \
ti/k3-am625-beagleplay.dtb \
ti/k3-am625-sk-csi2-ov5640.dtbo \
ti/k3-am625-sk-csi2-tevi-ov5640.dtbo \
ti/k3-am625-sk.dtb \
ti/k3-am625-sk-ecap-capture.dtbo \
ti/k3-am625-skeleton.dtb \
ti/k3-am625-sk-hdmi-audio.dtbo \
ti/k3-am625-sk-lpmdemo.dtb \
ti/k3-am625-sk-mcan.dtbo \
ti/k3-am625-sk-oldi-panel.dtbo \
ti/k3-am625-sk-qspi-flash.dtbo \
ti/k3-am625-sk-rpi-hdr-pwm.dtbo \
ti/k3-am625-sk-rpi-hdr-spi.dtbo \
ti/overlays/BBAI64-CSI0-imx219.dtbo \
ti/overlays/BBAI64-CSI1-imx219.dtbo \
ti/overlays/BBAI64-DSI-RPi-7inch-panel.dtbo \
ti/overlays/BBAI64-P8_37-ehrpwm5_a.dtbo \
ti/overlays/BBAI64-P9_25-ehrpwm4_b.dtbo \
ti/overlays/BB-I2C2-MPU6050.dtbo \
ti/overlays/BBORG_LOAD-00A2.dtbo \
ti/overlays/BBORG_RELAY-00A2.dtbo \
ti/overlays/BBORG_SERVO-00A2.dtbo \
ti/overlays/BONE-FAN.dtbo \
ti/overlays/BONE-I2C1.dtbo \
ti/overlays/BONE-I2C2.dtbo \
ti/overlays/BONE-I2C3.dtbo \
ti/overlays/BONE-LED_P8_03.dtbo \
ti/overlays/BONE-LED_P9_11.dtbo \
ti/overlays/BONE-PWM0.dtbo \
ti/overlays/BONE-PWM1.dtbo \
ti/overlays/BONE-PWM2.dtbo \
ti/overlays/BONE-SPI0_0.dtbo \
ti/overlays/BONE-SPI0_1.dtbo \
ti/overlays/BONE-SPI1_0.dtbo \
ti/overlays/BONE-UART1.dtbo \
ti/overlays/BONE-USB0-host.dtbo \
ti/overlays/k3-am625-beagleplay-bcfserial-no-firmware.dtbo \
ti/overlays/k3-am625-beagleplay-csi2-ov5640.dtbo \
ti/overlays/k3-am625-beagleplay-lt-lcd185.dtbo \
ti/overlays/robotics-cape.dtbo \
"
MACHINE_GUI_CLASS = "bigscreen"
MACHINE_ESSENTIAL_EXTRA_RDEPENDS += "kernel-devicetree kernel-image-image"

View File

@@ -8,20 +8,18 @@ MACHINE_FEATURES += "touchscreen"
SERIAL_CONSOLES = "115200;ttyS0"
KERNEL_DEVICETREE_PREFIX = " \
dra7 \
ti/dra7 \
ti/lcd \
"
KERNEL_DEVICETREE = " \
dra7-evm.dtb \
ti/dra7x-evm-osd-lcd-common.dtbo \
dra71-evm.dtb \
${@oe.utils.conditional('PREFERRED_PROVIDER_virtual/kernel', 'linux-ti-mainline', '', 'dra71-evm-nand.dtb', d)} \
ti/dra71-evm-lcd-auo-g101evn01.0.dtbo \
dra72-evm.dtb \
dra72-evm-revc.dtb \
ti/dra72-evm-touchscreen.dtbo \
ti/dra74-evm-touchscreen.dtbo \
dra76-evm.dtb \
ti/dra76-evm-tfp410.dtbo \
ti/lcd-osd101t2045.dtbo \
ti/lcd-osd101t2587.dtbo \
"
UBOOT_MACHINE = "dra7xx_evm_config"

View File

@@ -11,11 +11,19 @@ UBOOT_LOADADDRESS = "0x82000000"
UBOOT_RD_LOADADDRESS = "0x84000000"
UBOOT_RD_ENTRYPOINT = "0x84000000"
TI_SECURE_DEV_PKG = "${TI_SECURE_DEV_PKG_AUTO}/dra7"
OPTEEMACHINE = "ti-dra7xx"
OPTEEFLAVOR = "dra7xx"
OPTEEOUTPUTMACHINE = "ti"
OPTEEPAGER = "y"
EXTRA_IMAGEDEPENDS += "optee-os"
# FIT image for legacy secure devices
KERNEL_CLASSES += " kernel-fitimage-legacyhs"
KERNEL_IMAGETYPES += " fitImage"
# FIT image settings
FITIMAGE_HASH_ALGO = ""
FITIMAGE_PACK_TEE = "1"
FITIMAGE_DTB_BY_NAME = "1"
FITIMAGE_TEE_BY_NAME = "1"
FITIMAGE_CONF_BY_NAME = "1"

View File

@@ -0,0 +1,5 @@
require conf/machine/include/omap-a15.inc
SOC_FAMILY:append = ":dra7xx"
SOC_FAMILY:append = ":am57xx"
MACHINE_FEATURES += "pci"

View File

@@ -0,0 +1,18 @@
require conf/machine/include/k3.inc
SOC_FAMILY:append = ":am62axx"
MACHINE_FEATURES += "screen touchscreen"
TFA_K3_SYSTEM_SUSPEND = "1"
# Default tiboot3.bin on AM62A is for HS-FS
IMAGE_BOOT_FILES += "tiboot3-am62ax-hs-fs-evm.bin"
# Since default tiboot3.bin on AM62A is for HS-FS, add a version for GP
IMAGE_BOOT_FILES += "tiboot3-am62ax-gp-evm.bin"
# Since default tiboot3.bin on AM62A is for HS-FS, add a version for HS-SE
IMAGE_BOOT_FILES += "tiboot3-am62ax-hs-evm.bin"
TFA_BOARD = "lite"
OPTEEMACHINE = "k3-am62x"

View File

@@ -1,22 +1,27 @@
require conf/machine/include/k3.inc
SOC_FAMILY:append = ":am62xx"
MACHINE_FEATURES += "screen touchscreen gpu"
MACHINE_FEATURES += "screen gpu"
SERIAL_CONSOLES = "115200;ttyS2"
SERIAL_CONSOLES_CHECK = "${SERIAL_CONSOLES}"
PREFERRED_PROVIDER_virtual/egl ?= "ti-img-rogue-umlibs"
PREFERRED_PROVIDER_virtual/libgles1 ?= "ti-img-rogue-umlibs"
PREFERRED_PROVIDER_virtual/libgles2 ?= "ti-img-rogue-umlibs"
PREFERRED_PROVIDER_virtual/libgbm ?= "ti-img-rogue-umlibs"
require conf/machine/include/mesa-pvr.inc
PREFERRED_PROVIDER_virtual/gpudriver ?= "ti-img-rogue-driver"
do_image_wic[mcdepends] = "mc::k3r5:ti-sci-fw:do_deploy"
do_image_tar[mcdepends] = "mc::k3r5:ti-sci-fw:do_deploy"
# Default tiboot3.bin on AM62x is for HS-FS
IMAGE_BOOT_FILES += "tiboot3-am62x-hs-fs-evm.bin"
# Since default tiboot3.bin on AM62x is for HS-FS, add a version for GP
IMAGE_BOOT_FILES += "tiboot3-am62x-gp-evm.bin"
# Since default tiboot3.bin on AM62x is for HS-FS, add a version for HS-SE
IMAGE_BOOT_FILES += "tiboot3-am62x-hs-evm.bin"
# Bitmap image tarball for early splashscreen
IMAGE_BOOT_FILES += "ti_logo_414x97_32bpp.bmp.gz"
TFA_BOARD = "lite"
TFA_K3_SYSTEM_SUSPEND = "1"
OPTEEMACHINE = "k3-am62x"
OPTEEOUTPUTMACHINE = "k3"
# Normally AM62 boards use ttyS2, but our Jailhouse inmate may use ttyS3, so try both
SERIAL_CONSOLES = "115200;ttyS2 115200;ttyS3"

View File

@@ -1,22 +1,22 @@
require conf/machine/include/k3.inc
SOC_FAMILY:append = ":am64xx"
MACHINE_FEATURES += "screen touchscreen"
SERIAL_CONSOLES = "115200;ttyS2 115200;ttyS1"
SERIAL_CONSOLES_CHECK = "${SERIAL_CONSOLES}"
KERNEL_DEVICETREE_PREFIX = "ti/k3-am642"
KERNEL_DEVICETREE = " \
ti/k3-am642-evm.dtb \
ti/k3-am642-sk.dtb \
ti/k3-am642-evm-icssg1-dualemac.dtbo \
ti/k3-am642-evm-icssg1-dualemac-mii.dtbo \
ti/k3-am642-evm-nand.dtbo \
"
do_image_wic[mcdepends] = "mc::k3r5:ti-sci-fw:do_deploy"
do_image_tar[mcdepends] = "mc::k3r5:ti-sci-fw:do_deploy"
# Default tiboot3.bin on AM64x is for SR2.0 HS-FS
IMAGE_BOOT_FILES += "tiboot3-am64x_sr2-hs-fs-evm.bin"
# Since default tiboot3.bin on AM64x is for SR2.0 HS-FS, add a version for GP
IMAGE_BOOT_FILES += "tiboot3-am64x-gp-evm.bin"
# Since default tiboot3.bin on AM64x is for SR2.0 HS-FS, add a version for SR2.0 HS-SE
IMAGE_BOOT_FILES += "tiboot3-am64x_sr2-hs-evm.bin"
TFA_BOARD = "lite"
OPTEEMACHINE = "k3-am64x"
OPTEEOUTPUTMACHINE = "k3"

View File

@@ -3,39 +3,25 @@ SOC_FAMILY:append = ":am65xx"
MACHINE_FEATURES += "screen touchscreen gpu"
SERIAL_CONSOLES = "115200;ttyS2 115200;ttyS1"
SERIAL_CONSOLES_CHECK = "${SERIAL_CONSOLES}"
require conf/machine/include/mesa-pvr.inc
PREFERRED_PROVIDER_virtual/gpudriver ?= ""
PREFERRED_PROVIDER_virtual/egl ?= "ti-sgx-ddk-um"
PREFERRED_PROVIDER_virtual/libgles1 ?= "ti-sgx-ddk-um"
PREFERRED_PROVIDER_virtual/libgles2 ?= "ti-sgx-ddk-um"
PREFERRED_PROVIDER_virtual/libgbm ?= "ti-sgx-ddk-um"
PREFERRED_PROVIDER_virtual/gpudriver ?= "ti-sgx-ddk-km"
KERNEL_DEVICETREE_PREFIX = "ti/k3-am654"
KERNEL_DEVICETREE = " \
ti/k3-am654-base-board.dtb \
ti/k3-am654-base-board-sr1.dtbo \
ti/k3-am654-gp.dtbo \
ti/k3-am654-idk.dtbo \
ti/k3-am654-idk-sr1.dtbo \
ti/k3-am654-sr1.dtbo \
ti/k3-am654-pcie-usb2.dtbo \
ti/k3-am654-pcie-usb3.dtbo \
ti/k3-am654-evm-tc358876.dtbo \
ti/k3-am654-evm-oldi-lcd1evm.dtbo \
ti/k3-am654-evm-ov5640.dtbo \
"
BBMULTICONFIG += "k3r5-sr2"
# Since J721e does not support multi-cert tiboot3.bin add standalone sysfw.itb
IMAGE_BOOT_FILES += "sysfw.itb"
# Since default sysfw.itb on AM65x is for SR2.0, add a version for SR1.0
IMAGE_BOOT_FILES += "sysfw-am65x-evm.itb"
# Default on AM65x is for GP
IMAGE_BOOT_FILES += "tiboot3-am65x_sr2-gp-evm.bin"
IMAGE_BOOT_FILES += "sysfw-am65x_sr2-gp-evm.itb"
do_image_wic[mcdepends] += "mc::k3r5-sr2:ti-sci-fw:do_deploy"
do_image_tar[mcdepends] += "mc::k3r5-sr2:ti-sci-fw:do_deploy"
# Since default on AM65x is for GP, add a version for HS-SE
IMAGE_BOOT_FILES += "tiboot3-am65x_sr2-hs-evm.bin"
IMAGE_BOOT_FILES += "sysfw-am65x_sr2-hs-evm.itb"
TFA_BOARD = "generic"
OPTEEMACHINE = "k3-am65x"
OPTEEOUTPUTMACHINE = "k3"

View File

@@ -1,7 +0,0 @@
require conf/machine/include/k3.inc
SOC_FAMILY:append = ":j7"
OPTEEMACHINE = "k3-j721e"
OPTEEOUTPUTMACHINE = "k3"
# Use default IMAGE_BOOT_FILES_LEGACY files

View File

@@ -1,2 +1,6 @@
require conf/machine/include/j7.inc
require conf/machine/include/k3.inc
SOC_FAMILY:append = ":j7200"
TFA_BOARD = "generic"
OPTEEMACHINE = "k3-j721e"

View File

@@ -1,10 +1,25 @@
require conf/machine/include/j7.inc
require conf/machine/include/k3.inc
SOC_FAMILY:append = ":j721e"
MACHINE_FEATURES += "gpu"
MACHINE_FEATURES += "screen gpu"
PREFERRED_PROVIDER_virtual/egl ?= "ti-img-rogue-umlibs"
PREFERRED_PROVIDER_virtual/libgles1 ?= "ti-img-rogue-umlibs"
PREFERRED_PROVIDER_virtual/libgles2 ?= "ti-img-rogue-umlibs"
PREFERRED_PROVIDER_virtual/libgbm ?= "ti-img-rogue-umlibs"
require conf/machine/include/mesa-pvr.inc
PREFERRED_PROVIDER_virtual/gpudriver ?= "ti-img-rogue-driver"
IMAGE_BOOT_FILES += "sysfw.itb"
# Default on J721e is for GP
IMAGE_BOOT_FILES += "tiboot3-j721e-gp-evm.bin"
IMAGE_BOOT_FILES += "sysfw-j721e-gp-evm.itb"
# Since default on J721e is for GP, add a version for HS-FS
IMAGE_BOOT_FILES += "tiboot3-j721e_sr2-hs-fs-evm.bin"
IMAGE_BOOT_FILES += "sysfw-j721e_sr2-hs-fs-evm.itb"
# Since default on J721e is for GP, add a version for HS-SE
IMAGE_BOOT_FILES += "tiboot3-j721e_sr1_1-hs-evm.bin"
IMAGE_BOOT_FILES += "sysfw-j721e_sr1_1-hs-evm.itb"
TFA_BOARD = "generic"
OPTEEMACHINE = "k3-j721e"

View File

@@ -1,10 +1,11 @@
require conf/machine/include/j7.inc
require conf/machine/include/k3.inc
SOC_FAMILY:append = ":j721s2"
MACHINE_FEATURES += "gpu"
MACHINE_FEATURES += "screen gpu"
PREFERRED_PROVIDER_virtual/egl ?= "ti-img-rogue-umlibs"
PREFERRED_PROVIDER_virtual/libgles1 ?= "ti-img-rogue-umlibs"
PREFERRED_PROVIDER_virtual/libgles2 ?= "ti-img-rogue-umlibs"
PREFERRED_PROVIDER_virtual/libgbm ?= "ti-img-rogue-umlibs"
require conf/machine/include/mesa-pvr.inc
PREFERRED_PROVIDER_virtual/gpudriver ?= "ti-img-rogue-driver"
TFA_BOARD = "generic"
OPTEEMACHINE = "k3-j784s4"

View File

@@ -0,0 +1,11 @@
require conf/machine/include/k3.inc
SOC_FAMILY:append = ":j784s4"
MACHINE_FEATURES += "screen gpu"
require conf/machine/include/mesa-pvr.inc
PREFERRED_PROVIDER_virtual/gpudriver ?= "ti-img-rogue-driver"
TFA_BOARD = "j784s4"
OPTEEMACHINE = "k3-j784s4"

View File

@@ -15,27 +15,39 @@ PREFERRED_PROVIDER_virtual/bootloader ?= "u-boot-ti-staging"
PREFERRED_PROVIDER_u-boot ?= "u-boot-ti-staging"
KERNEL_IMAGETYPE = "Image"
KERNEL_IMAGETYPES = "Image vmlinux.gz"
KERNEL_IMAGETYPES = "Image fitImage"
KERNEL_CLASSES += "kernel-fitimage"
UBOOT_ARCH = "arm"
UBOOT_ENTRYPOINT = "0x80008000"
UBOOT_LOADADDRESS = "0x80008000"
UBOOT_ENTRYPOINT = "0x81000000"
UBOOT_LOADADDRESS = "0x81000000"
UBOOT_RD_LOADADDRESS = "0x84000000"
UBOOT_RD_ENTRYPOINT = "0x84000000"
UBOOT_DTB_LOADADDRESS = "0x83000000"
UBOOT_DTBO_LOADADDRESS = "0x83080000"
UBOOT_DTBO_OFFSET = "0x00010000"
SPL_BINARY = "tispl.bin"
SPL_BINARYNAME = "tispl.bin"
UBOOT_SUFFIX = "img"
UBOOT_SIGN_ENABLE = "1"
UBOOT_MKIMAGE_DTCOPTS = "-I dts -O dtb"
UBOOT_SIGN_KEYNAME ?= "custMpk"
UBOOT_SIGN_KEYDIR ?= "${TI_SECURE_DEV_PKG}/keys"
FIT_HASH_ALG ?= "sha512"
FIT_SIGN_ALG ?= "rsa4096"
EXTRA_IMAGEDEPENDS += "virtual/bootloader"
TFA_PLATFORM = "k3"
TFA_BOARD = "generic"
# Use the expected value of the ubifs filesystem's volume name in the kernel
# and u-boot.
UBI_VOLNAME = "rootfs"
# List common SoC features, may need to add touchscreen for specific machines
MACHINE_FEATURES = "kernel26 apm usbgadget usbhost vfat ext2 alsa ethernet pci"
MACHINE_FEATURES = "apm usbgadget usbhost vfat ext2 alsa pci"
IMAGE_FSTYPES += "tar.xz wic.xz wic.bmap"
@@ -45,7 +57,10 @@ IMAGE_EFI_BOOT_FILES ?= "${IMAGE_BOOT_FILES}"
EFI_PROVIDER ?= "grub-efi"
MACHINE_FEATURES += "efi"
WKS_FILE ?= "sdimage-2part-efi.wks"
WKS_FILE ?= "${@bb.utils.contains("MACHINE_FEATURES", "efi", "sdimage-2part-efi.wks.in", "sdimage-2part.wks", d)}"
do_image_wic[depends] += "virtual/bootloader:do_deploy"
do_image_wic[mcdepends] += "mc::k3r5:virtual/bootloader:do_deploy mc::k3r5:ti-sci-fw:do_deploy"
do_image_tar[mcdepends] += "mc::k3r5:virtual/bootloader:do_deploy mc::k3r5:ti-sci-fw:do_deploy"
do_image_complete[mcdepends] += "mc::k3r5:virtual/bootloader:do_deploy"
SERIAL_CONSOLES = "115200;ttyS0 115200;ttyS2"
SERIAL_CONSOLES_CHECK = "${SERIAL_CONSOLES}"

View File

@@ -8,17 +8,20 @@ DEFAULTTUNE = "armv7athf"
require conf/machine/include/arm/armv7a/tune-cortexa8.inc
# R5 runs early bootloader and loads SYSFW
# https://git.ti.com/cgit/ti-u-boot/ti-u-boot/tree/board/ti/am65x/README
# https://git.ti.com/cgit/ti-u-boot/ti-u-boot/tree/board/ti/j721e/README
PREFERRED_PROVIDER_virtual/kernel = "linux-dummy"
PREFERRED_PROVIDER_virtual/bootloader = "u-boot-ti-staging"
PREFERRED_PROVIDER_u-boot = "u-boot-ti-staging"
# https://git.ti.com/cgit/ti-u-boot/ti-u-boot/tree/doc/board/ti/j721e_evm.rst
# https://git.ti.com/cgit/ti-u-boot/ti-u-boot/tree/doc/board/ti/am62x_sk.rst
# https://git.ti.com/cgit/ti-u-boot/ti-u-boot/tree/doc/board/ti/k3.rst
PREFERRED_PROVIDER_virtual/kernel ?= "linux-dummy"
PREFERRED_PROVIDER_virtual/bootloader ?= "u-boot-ti-staging"
PREFERRED_PROVIDER_u-boot ?= "u-boot-ti-staging"
SPL_BINARY = ""
SPL_SUFFIX = "bin"
SPL_BINARY = "tiboot3-${SYSFW_SOC}-${SYSFW_SUFFIX}-${SYSFW_CONFIG}.${SPL_SUFFIX}"
SPL_SYMLINK = "tiboot3.${SPL_SUFFIX}"
UBOOT_SUFFIX = "bin"
UBOOT_BINARY = "tiboot3.${UBOOT_SUFFIX}"
UBOOT_IMAGE = "tiboot3-${MAINMACHINE}-${PV}-${PR}.${UBOOT_SUFFIX}"
UBOOT_SYMLINK = "tiboot3-${MAINMACHINE}.${UBOOT_SUFFIX}"
UBOOT_BINARY = "u-boot-spl.${UBOOT_SUFFIX}"
UBOOT_IMAGE = "u-boot-r5spl-${MAINMACHINE}-${PV}-${PR}.${UBOOT_SUFFIX}"
UBOOT_SYMLINK = "u-boot-r5spl.${UBOOT_SUFFIX}"
PACKAGECONFIG:pn-u-boot-ti-staging = ""
PACKAGECONFIG:pn-u-boot-ti-mainline = ""

View File

@@ -0,0 +1,8 @@
PREFERRED_PROVIDER_virtual/mesa ?= "mesa-pvr"
PREFERRED_PROVIDER_virtual/egl ?= "mesa-pvr"
PREFERRED_PROVIDER_virtual/libgles1 ?= "mesa-pvr"
PREFERRED_PROVIDER_virtual/libgles2 ?= "mesa-pvr"
PREFERRED_PROVIDER_virtual/libgles3 ?= "mesa-pvr"
PREFERRED_PROVIDER_virtual/libgbm ?= "mesa-pvr"
PREFERRED_PROVIDER_virtual/libglx ?= "mesa-pvr"
PREFERRED_PROVIDER_virtual/libgl ?= "mesa-pvr"

View File

@@ -10,11 +10,11 @@ MACHINE_KERNEL_PR = "r7"
PREFERRED_PROVIDER_virtual/kernel ?= "linux-ti-staging"
PREFERRED_PROVIDER_virtual/bootloader ?= "u-boot-ti-staging"
PREFERRED_PROVIDER_u-boot ?= "u-boot-ti-staging"
PREFERRED_PROVIDER_virtual/egl ?= "ti-sgx-ddk-um"
PREFERRED_PROVIDER_virtual/libgles1 ?= "ti-sgx-ddk-um"
PREFERRED_PROVIDER_virtual/libgles2 ?= "ti-sgx-ddk-um"
PREFERRED_PROVIDER_virtual/libgbm ?= "ti-sgx-ddk-um"
PREFERRED_PROVIDER_virtual/gpudriver ?= "ti-sgx-ddk-km"
# Graphics providers and variables
require conf/machine/include/mesa-pvr.inc
PREFERRED_PROVIDER_virtual/gpudriver ?= ""
PVR_DISPLAY_CONTROLLER_ALIAS ?= "omapdrm"
KERNEL_IMAGETYPE = "zImage"
KERNEL_IMAGETYPES = "zImage uImage"
@@ -24,7 +24,7 @@ UBOOT_ARCH = "arm"
UBOOT_ENTRYPOINT = "0x80008000"
UBOOT_LOADADDRESS = "0x80008000"
DEVICETREE_FILE = "${@d.getVar('KERNEL_DEVICETREE').replace("ti/","")}"
DEVICETREE_FILE = "${@(d.getVar('KERNEL_DEVICETREE') or "").replace("ti/","")}"
# Generate an extlinux.conf file
UBOOT_EXTLINUX = "1"
@@ -45,9 +45,9 @@ EXTRA_IMAGEDEPENDS += "virtual/bootloader"
UBI_VOLNAME = "rootfs"
# List common SoC features, may need to add touchscreen for specific machines
MACHINE_FEATURES = "kernel26 apm usbgadget usbhost vfat ext2 screen alsa ethernet gpu mmip dsp gc320"
MACHINE_FEATURES = "apm usbgadget usbhost vfat ext2 screen alsa gpu mmip dsp gc320"
IMAGE_FSTYPES += "tar.xz wic.xz wic.bmap"
WKS_FILE ?= "sdimage-2part.wks"
IMAGE_BOOT_FILES ?= "${SPL_BINARY} u-boot.${UBOOT_SUFFIX} ${UBOOT_EXTLINUX_BOOT_FILES}"
do_image_wic[depends] += "u-boot:do_deploy"
do_image_wic[depends] += "virtual/bootloader:do_deploy"

View File

@@ -1,2 +0,0 @@
require conf/machine/include/ti-soc.inc
SOC_FAMILY:append = ":omapl1"

View File

@@ -1,2 +1,14 @@
require conf/machine/include/omapl1.inc
require conf/machine/include/ti-soc.inc
SOC_FAMILY:append = ":omapl138"
require conf/machine/include/arm/armv5/tune-arm926ejs.inc
KERNEL_IMAGETYPE = "zImage"
PREFERRED_PROVIDER_virtual/kernel ?= "linux-ti-staging"
PREFERRED_PROVIDER_virtual/bootloader = "u-boot-ti-staging"
PREFERRED_PROVIDER_u-boot = "u-boot-ti-staging"
EXTRA_IMAGEDEPENDS += "virtual/bootloader"
MACHINE_FEATURES = "serial usbhost usbgadget alsa"

View File

@@ -0,0 +1,4 @@
# Add TI_EXTRAS to machine overrides so we get access to e.g. 'jailhouse'
TI_EXTRAS ??= ""
MACHINEOVERRIDES =. "${@ '${TI_EXTRAS}:' if d.getVar('TI_EXTRAS').startswith('tie-') else ''}"

View File

@@ -11,25 +11,30 @@ MACHINE_KERNEL_PR = "r22"
PREFERRED_PROVIDER_virtual/kernel ?= "linux-ti-staging"
PREFERRED_PROVIDER_virtual/bootloader ?= "u-boot-ti-staging"
PREFERRED_PROVIDER_u-boot ?= "u-boot-ti-staging"
PREFERRED_PROVIDER_virtual/egl ?= "ti-sgx-ddk-um"
PREFERRED_PROVIDER_virtual/libgles1 ?= "ti-sgx-ddk-um"
PREFERRED_PROVIDER_virtual/libgles2 ?= "ti-sgx-ddk-um"
PREFERRED_PROVIDER_virtual/libgbm ?= "ti-sgx-ddk-um"
PREFERRED_PROVIDER_virtual/gpudriver ?= "ti-sgx-ddk-km"
# Graphics providers and variables
require conf/machine/include/mesa-pvr.inc
PREFERRED_PROVIDER_virtual/gpudriver ?= ""
PVR_DISPLAY_CONTROLLER_ALIAS ?= "tilcdc"
KERNEL_IMAGETYPE = "zImage"
KERNEL_DEVICETREE_PREFIX = "am335x"
KERNEL_DEVICETREE = " \
am335x-evm.dtb am335x-evmsk.dtb \
am335x-evm.dtb \
am335x-evmsk.dtb \
am335x-icev2.dtb \
am335x-pocketbeagle.dtb am335x-bone.dtb am335x-boneblue.dtb \
am335x-bonegreen.dtb am335x-bonegreen-wireless.dtb \
am335x-boneblack.dtb am335x-boneblack-wireless.dtb \
am335x-pocketbeagle.dtb \
am335x-bone.dtb \
am335x-boneblue.dtb \
am335x-bonegreen.dtb \
am335x-bonegreen-wireless.dtb \
am335x-boneblack.dtb \
am335x-boneblack-wireless.dtb \
am335x-sancloud-bbe.dtb \
"
KERNEL_DEVICETREE += "${@oe.utils.conditional('ENABLE_TI_UIO_DEVICES', '1', 'am335x-icev2-pru-excl-uio.dtb', '', d)}"
UBOOT_ARCH = "arm"
UBOOT_MACHINE = "am335x_evm_config"
@@ -55,7 +60,7 @@ UBI_VOLNAME = "rootfs"
EXTRA_IMAGEDEPENDS += "virtual/bootloader"
# List common SoC features, may need to add touchscreen for specific machines
MACHINE_FEATURES = "kernel26 apm usbgadget usbhost vfat ext2 alsa ethernet gpu"
MACHINE_FEATURES = "apm usbgadget usbhost vfat ext2 alsa gpu"
IMAGE_FSTYPES += "tar.xz wic.xz wic.bmap"
WKS_FILE ?= "sdimage-2part.wks"

View File

@@ -11,20 +11,24 @@ MACHINE_KERNEL_PR = "r3"
PREFERRED_PROVIDER_virtual/kernel ?= "linux-ti-staging"
PREFERRED_PROVIDER_virtual/bootloader ?= "u-boot-ti-staging"
PREFERRED_PROVIDER_u-boot ?= "u-boot-ti-staging"
PREFERRED_PROVIDER_virtual/egl ?= "ti-sgx-ddk-um"
PREFERRED_PROVIDER_virtual/libgles1 ?= "ti-sgx-ddk-um"
PREFERRED_PROVIDER_virtual/libgles2 ?= "ti-sgx-ddk-um"
PREFERRED_PROVIDER_virtual/libgbm ?= "ti-sgx-ddk-um"
PREFERRED_PROVIDER_virtual/gpudriver ?= "ti-sgx-ddk-km"
# Graphics providers and variables
require conf/machine/include/mesa-pvr.inc
PREFERRED_PROVIDER_virtual/gpudriver ?= ""
PVR_DISPLAY_CONTROLLER_ALIAS ?= "omapdrm"
KERNEL_IMAGETYPE = "zImage"
KERNEL_DEVICETREE_PREFIX = " \
am437x \
am43x \
"
KERNEL_DEVICETREE = " \
am437x-gp-evm.dtb \
${@oe.utils.conditional('PREFERRED_PROVIDER_virtual/kernel', 'linux-ti-mainline', '', 'am437x-gp-evm-hdmi.dtb', d)} \
am437x-sk-evm.dtb am437x-idk-evm.dtb \
am437x-sk-evm.dtb \
am437x-idk-evm.dtb \
am43x-epos-evm.dtb \
${@oe.utils.conditional('PREFERRED_PROVIDER_virtual/kernel', 'linux-ti-mainline', '', 'am43x-epos-evm-hdmi.dtb', d)} \
"
KERNEL_DEVICETREE += "${@oe.utils.conditional('ENABLE_TI_UIO_DEVICES', '1', 'am437x-idk-pru-excl-uio.dtb', '', d)}"
@@ -54,9 +58,9 @@ UBI_VOLNAME = "rootfs"
EXTRA_IMAGEDEPENDS += "u-boot"
# List common SoC features, may need to add touchscreen for specific machines
MACHINE_FEATURES = "kernel26 apm usbgadget usbhost vfat ext2 screen alsa ethernet gpu"
MACHINE_FEATURES = "apm usbgadget usbhost vfat ext2 screen alsa gpu"
IMAGE_FSTYPES += "tar.xz wic.xz wic.bmap"
WKS_FILE ?= "sdimage-2part.wks"
IMAGE_BOOT_FILES ?= "${SPL_BINARY} u-boot.${UBOOT_SUFFIX} ${UBOOT_EXTLINUX_BOOT_FILES}"
do_image_wic[depends] += "u-boot:do_deploy"
do_image_wic[depends] += "virtual/bootloader:do_deploy"

View File

@@ -4,14 +4,10 @@
require conf/machine/include/j7200.inc
SERIAL_CONSOLES = "115200;ttyS2 115200;ttyS3"
SERIAL_CONSOLES_CHECK = "${SERIAL_CONSOLES}"
KERNEL_DEVICETREE_PREFIX = "ti/k3-j7200"
KERNEL_DEVICETREE = " \
ti/k3-j7200-common-proc-board.dtb \
"
UBOOT_MACHINE = "j7200_evm_a72_config"
do_image_wic[mcdepends] = "mc::k3r5:ti-sci-fw:do_deploy"
do_image_tar[mcdepends] = "mc::k3r5:ti-sci-fw:do_deploy"

View File

@@ -8,6 +8,4 @@ SYSFW_SOC = "j7200_sr2"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs"
UBOOT_MACHINE = "j7200_hs_evm_r5_defconfig"
TI_SECURE_DEV_PKG = "${TI_SECURE_DEV_PKG_K3}"
UBOOT_MACHINE = "j7200_evm_r5_defconfig"

View File

@@ -4,18 +4,4 @@
require conf/machine/j7200-evm.conf
UBOOT_MACHINE = "j7200_hs_evm_a72_defconfig"
UBOOT_ENTRYPOINT = "0x80080000"
UBOOT_LOADADDRESS = "0x80080000"
UBOOT_RD_LOADADDRESS = "0x84000000"
UBOOT_RD_ENTRYPOINT = "0x84000000"
UBOOT_DTB_LOADADDRESS = "0x83000000"
UBOOT_DTBO_LOADADDRESS = "0x83080000"
UBOOT_DTBO_OFFSET = "0x00010000"
SPL_BINARY = "tispl.bin_HS"
UBOOT_BINARY = "u-boot.img_HS"
UBOOT_SYMLINK = "u-boot.img"
TI_SECURE_DEV_PKG = "${TI_SECURE_DEV_PKG_K3}"
UBOOT_MACHINE = "j7200_evm_a72_defconfig"

View File

@@ -4,15 +4,14 @@
require conf/machine/include/j721e.inc
SERIAL_CONSOLES = "115200;ttyS2 115200;ttyS3"
SERIAL_CONSOLES_CHECK = "${SERIAL_CONSOLES}"
# Since J721e does not support multi-cert tiboot3.bin add standalone sysfw.itb
IMAGE_BOOT_FILES += "sysfw.itb"
KERNEL_DEVICETREE_PREFIX = " \
ti/k3-j721e \
ti/k3-fpdlink \
ti/k3-j7200-evm-mcspi-loopback \
"
KERNEL_DEVICETREE = " \
ti/k3-j721e-common-proc-board.dtb \
ti/k3-j721e-common-proc-board-infotainment.dtbo \
ti/k3-j721e-sk.dtb \
"

View File

@@ -1,11 +0,0 @@
#@TYPE: Machine
#@NAME: J721e SR1.1 HS EVM (R5F)
#@DESCRIPTION: Machine configuration for the TI J721e SR1.1 HS EVM (R5F core)
# Booting SR1.1 requires different SYSFW, the rest is handled at runtime
require conf/machine/j721e-hs-evm-k3r5.conf
SOC_FAMILY:append = ":k3r5-sr1-1"
SYSFW_SOC = "j721e_sr1_1"
SYSFW_SYMLINK = "sysfw.itb"

View File

@@ -4,11 +4,8 @@
require conf/machine/include/k3r5.inc
SYSFW_SOC = "j721e"
SYSFW_SOC = "j721e_sr1_1"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs"
SYSFW_SYMLINK = ""
UBOOT_MACHINE = "j721e_hs_evm_r5_defconfig"
TI_SECURE_DEV_PKG = "${TI_SECURE_DEV_PKG_K3}"
UBOOT_MACHINE = "j721e_evm_r5_defconfig"

View File

@@ -4,25 +4,4 @@
require conf/machine/j721e-evm.conf
UBOOT_MACHINE = "j721e_hs_evm_a72_defconfig"
UBOOT_ENTRYPOINT = "0x80080000"
UBOOT_LOADADDRESS = "0x80080000"
UBOOT_RD_LOADADDRESS = "0x84000000"
UBOOT_RD_ENTRYPOINT = "0x84000000"
UBOOT_DTB_LOADADDRESS = "0x83000000"
UBOOT_DTBO_LOADADDRESS = "0x83080000"
UBOOT_DTBO_OFFSET = "0x00010000"
SPL_BINARY = "tispl.bin_HS"
UBOOT_BINARY = "u-boot.img_HS"
UBOOT_SYMLINK = "u-boot.img"
BBMULTICONFIG += "k3r5-sr1-1"
# Since default sysfw.itb on J721e is for SR1.1, add a version for SR1.0
IMAGE_BOOT_FILES += "sysfw-j721e-evm.itb"
do_image_wic[mcdepends] += "mc::k3r5-sr1-1:ti-sci-fw:do_deploy"
do_image_tar[mcdepends] += "mc::k3r5-sr1-1:ti-sci-fw:do_deploy"
TI_SECURE_DEV_PKG = "${TI_SECURE_DEV_PKG_K3}"
UBOOT_MACHINE = "j721e_evm_a72_defconfig"

View File

@@ -4,17 +4,24 @@
require conf/machine/include/j721s2.inc
SERIAL_CONSOLES = "115200;ttyS10"
SERIAL_CONSOLES_CHECK = "${SERIAL_CONSOLES}"
TFA_K3_USART = "0x8"
OPTEE_K3_USART = "0x8"
KERNEL_DEVICETREE_PREFIX = " \
ti/k3-j721s2 \
ti/k3-fpdlink \
ti/k3-j7200-evm-mcspi-loopback \
ti/k3-am68-sk \
"
KERNEL_DEVICETREE = " \
ti/k3-j721s2-common-proc-board.dtb \
ti/k3-j721s2-gesi-exp-board.dtbo \
"
UBOOT_MACHINE = "j721s2_evm_a72_defconfig"
do_image_wic[mcdepends] = "mc::k3r5:ti-sci-fw:do_deploy"
do_image_tar[mcdepends] = "mc::k3r5:ti-sci-fw:do_deploy"
# Default tiboot3.bin on J721S2 is for GP
IMAGE_BOOT_FILES += "tiboot3-j721s2-gp-evm.bin"
# Since default tiboot3.bin on J721S2 is for GP, add a version for SR1.0 HS-FS
IMAGE_BOOT_FILES += "tiboot3-j721s2-hs-fs-evm.bin"

View File

@@ -8,6 +8,4 @@ SYSFW_SOC = "j721s2"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs"
UBOOT_MACHINE = "j721s2_hs_evm_r5_defconfig"
TI_SECURE_DEV_PKG = "${TI_SECURE_DEV_PKG_K3}"
UBOOT_MACHINE = "j721s2_evm_r5_defconfig"

View File

@@ -3,19 +3,3 @@
#@DESCRIPTION: Machine configuration for the TI J721S2 HS EVM
require conf/machine/j721s2-evm.conf
UBOOT_MACHINE = "j721s2_hs_evm_a72_defconfig"
UBOOT_ENTRYPOINT = "0x80080000"
UBOOT_LOADADDRESS = "0x80080000"
UBOOT_RD_LOADADDRESS = "0x84000000"
UBOOT_RD_ENTRYPOINT = "0x84000000"
UBOOT_DTB_LOADADDRESS = "0x83000000"
UBOOT_DTBO_LOADADDRESS = "0x83080000"
UBOOT_DTBO_OFFSET = "0x00010000"
SPL_BINARY = "tispl.bin_HS"
UBOOT_BINARY = "u-boot.img_HS"
UBOOT_SYMLINK = "u-boot.img"
TI_SECURE_DEV_PKG = "${TI_SECURE_DEV_PKG_K3}"

View File

@@ -0,0 +1,11 @@
#@TYPE: Machine
#@NAME: J784S4 EVM (R5F)
#@DESCRIPTION: Machine configuration for the TI J784S4 EVM (R5F core)
require conf/machine/include/k3r5.inc
SYSFW_SOC = "j784s4"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "gp"
UBOOT_MACHINE = "j784s4_evm_r5_defconfig"

View File

@@ -0,0 +1,27 @@
#@TYPE: Machine
#@NAME: J784S4 EVM
#@DESCRIPTION: Machine configuration for the TI J784S4 EVM
require conf/machine/include/j784s4.inc
TFA_K3_USART = "0x8"
OPTEE_K3_USART = "0x8"
KERNEL_DEVICETREE_PREFIX = " \
ti/k3-j784s4 \
ti/k3-fpdlink \
ti/k3-j7200-evm-mcspi-loopback \
ti/k3-am69-sk \
"
KERNEL_DEVICETREE = " \
ti/k3-j784s4-evm.dtb \
"
UBOOT_MACHINE = "j784s4_evm_a72_defconfig"
# Default tiboot3.bin on J784S4 is for GP
IMAGE_BOOT_FILES += "tiboot3-j784s4-gp-evm.bin"
# Since default tiboot3.bin on J784S4 is for GP, add a version for SR1.0 HS-FS
IMAGE_BOOT_FILES += "tiboot3-j784s4-hs-fs-evm.bin"

View File

@@ -0,0 +1,11 @@
#@TYPE: Machine
#@NAME: J784S4 HS EVM (R5F)
#@DESCRIPTION: Machine configuration for the TI J784S4 HS EVM (R5F core)
require conf/machine/include/k3r5.inc
SYSFW_SOC = "j784s4"
SYSFW_CONFIG = "evm"
SYSFW_SUFFIX = "hs"
UBOOT_MACHINE = "j784s4_evm_r5_defconfig"

View File

@@ -0,0 +1,5 @@
#@TYPE: Machine
#@NAME: J784S4 HS EVM
#@DESCRIPTION: Machine configuration for the TI J784S4 HS EVM
require conf/machine/j784s4-evm.conf

View File

@@ -2,7 +2,6 @@
#@NAME: OMAP-L138 LCDK
#@DESCRIPTION: Machine configuration for the TI OMAP-L138 LCDK board
require conf/machine/include/davinci.inc
require conf/machine/include/omapl138.inc
UBOOT_MACHINE = "omapl138_lcdk_config"
@@ -16,4 +15,9 @@ IMAGE_FSTYPES += "tar.xz"
SERIAL_CONSOLES = "115200;ttyS2"
KERNEL_DEVICETREE = "da850-evm.dtb da850-lcdk.dtb"
KERNEL_DEVICETREE_PREFIX = "da850"
KERNEL_DEVICETREE = " \
da850-evm.dtb \
da850-lcdk.dtb \
"

View File

@@ -1,3 +0,0 @@
require k3r5.conf
MACHINE:append = "-sr1-1"

View File

@@ -1,3 +0,0 @@
require k3r5.conf
MACHINE:append = "-sr2"

View File

@@ -10,7 +10,7 @@ PR = "${INC_PR}.0"
CLEANBROKEN = "1"
COMPATIBLE_MACHINE = "j721e"
COMPATIBLE_MACHINE = "j721e|j721s2|j784s4"
PACKAGE_ARCH = "${MACHINE_ARCH}"

View File

@@ -9,7 +9,7 @@ PR = "r0"
SRCREV = "fb484c5e54f2e31cf0a338d2927a06a2870bcc2c"
BRANCH ?= "ti-v4.1.y"
SRC_URI = "git://git.ti.com/processor-firmware/ti-amx3-cm3-pm-firmware.git;protocol=git;branch=${BRANCH}"
SRC_URI = "git://git.ti.com/git/processor-firmware/ti-amx3-cm3-pm-firmware.git;protocol=https;branch=${BRANCH}"
S = "${WORKDIR}/git"

View File

@@ -1,18 +0,0 @@
DESCRIPTION = "Kernel module for contiguous memory allocation from userspace"
include cmem.inc
# This package builds a kernel module, use kernel PR as base and append a local
MACHINE_KERNEL_PR:append = "a"
PR = "${MACHINE_KERNEL_PR}"
inherit module
EXTRA_OEMAKE += '-f lu.mak KERNEL_INSTALL_DIR="${STAGING_KERNEL_DIR}" TOOLCHAIN_PREFIX="${TOOLCHAIN_PREFIX}" EXEC_DIR="${D}${nonarch_base_libdir}/modules/${KERNEL_VERSION}/extra"'
MAKE_TARGETS = "module"
KERNEL_MODULE_AUTOLOAD += "cmemk"
do_install:prepend() {
cp ${B}/src/cmem/module/Module.symvers ${B}/ || true
}

View File

@@ -9,7 +9,7 @@ SRCREV = "86269258a48e0a9008dd9d5ebfae9da7ce843393"
PV = "4.20.00.01+git${SRCPV}"
SRC_URI = "git://git.ti.com/ipc/ludev.git;protocol=git;branch=${BRANCH}"
SRC_URI = "git://git.ti.com/git/ipc/ludev.git;protocol=https;branch=${BRANCH}"
S = "${WORKDIR}/git"
COMPATIBLE_HOST ?= "null"

View File

@@ -2,8 +2,6 @@ DESCRIPTION = "The cmem component supports contiguous memory allocation from use
include cmem.inc
RDEPENDS:${PN} = "cmem-mod"
PR = "r0"
PACKAGES =+ "${PN}-test"

View File

@@ -13,23 +13,21 @@ PR = "${INC_PR}.1"
CLEANBROKEN = "1"
COMPATIBLE_MACHINE = "j721s2"
COMPATIBLE_MACHINE = "j721s2|j784s4|am62axx"
PACKAGE_ARCH = "${MACHINE_ARCH}"
S = "${WORKDIR}/git"
TARGET_WAVE521C = "wave521c_codec_fw.bin"
SOURCE_WAVE521C = "wave521c_codec_fw.bin"
SOURCE_WAVE521C:j721s2 = "wave521c_j721s2_codec_fw.bin"
SOURCE_WAVE521C = "wave521c_k3_codec_fw.bin"
ALTERNATIVE_LINK_NAME[wave521c_codec_fw.bin] = "${nonarch_base_libdir}/firmware/${TARGET_WAVE521C}"
ALTERNATIVE_TARGET[wave521c_codec_fw.bin] = "${nonarch_base_libdir}/firmware/cnm/${TARGET_WAVE521C}"
ALTERNATIVE_PRIORITY = "10"
# Set up names for the firmwares
ALTERNATIVE_${PN}:j7 = "\
wave521c_codec_fw.bin"
ALTERNATIVE:${PN} = "wave521c_codec_fw.bin"
do_install() {
install -d ${D}${nonarch_base_libdir}/firmware/cnm

View File

@@ -9,11 +9,11 @@ PACKAGE_ARCH = "${MACHINE_ARCH}"
inherit deploy
inherit update-alternatives
PROTOCOL = "git"
PROTOCOL = "https"
BRANCH = "master"
SRCREV = "91f1628507bf7f8716f0bc7cafe88ad7f14c94f5"
SRC_URI = "git://git.ti.com/glsdk/ti-eth-fw.git;protocol=${PROTOCOL};branch=${BRANCH}"
SRC_URI = "git://git.ti.com/git/glsdk/ti-eth-fw.git;protocol=${PROTOCOL};branch=${BRANCH}"
S = "${WORKDIR}/git"

View File

@@ -15,7 +15,7 @@ BRANCH = "ti-${PV}-k5.10"
SRCREV = "e2a10f31e255a65ec30a6e10b890e77d7e9cb107"
SRC_URI = "git://git.ti.com/graphics/ti-gc320-driver.git;protocol=git;branch=${BRANCH}"
SRC_URI = "git://git.ti.com/git/graphics/ti-gc320-driver.git;protocol=https;branch=${BRANCH}"
S = "${WORKDIR}/git/src"

View File

@@ -1,29 +0,0 @@
From 80d32fee3d768abbd77cce77ea9a7574651460a9 Mon Sep 17 00:00:00 2001
From: Denys Dmytriyenko <denis@denix.org>
Date: Wed, 7 Jul 2021 13:11:56 -0400
Subject: [PATCH] compiler: support OpenEmbedded "nodistro" internal aarch64
toolchain
Upstream-Status: Pending
Signed-off-by: Denys Dmytriyenko <denis@denix.org>
---
build/linux/config/compiler.mk | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/build/linux/config/compiler.mk b/build/linux/config/compiler.mk
index 53a0bef..d788579 100644
--- a/build/linux/config/compiler.mk
+++ b/build/linux/config/compiler.mk
@@ -65,7 +65,7 @@ define calculate-compiler-preferred-target
ifneq ($$(filter i386-% i486-% i586-% i686-%,$$($(1)_compiler_preferred_target)),)
$(1)_compiler_preferred_target := i386-linux-gnu
endif
- ifneq ($$(filter aarch64-poky-linux,$$($(1)_compiler_preferred_target)),)
+ ifneq ($$(filter aarch64-oe-linux aarch64-poky-linux,$$($(1)_compiler_preferred_target)),)
$(1)_compiler_preferred_target := aarch64-linux-gnu
endif
ifneq ($$(filter armv7a-cros-linux-gnueabi armv7l-tizen-linux-gnueabi,$$($(1)_compiler_preferred_target)),)
--
2.7.4

View File

@@ -1,34 +0,0 @@
From cc95fb4b1635bd1018d74b668430cda67731148f Mon Sep 17 00:00:00 2001
From: Denys Dmytriyenko <denys@konsulko.com>
Date: Sat, 30 Apr 2022 18:37:46 +0000
Subject: [PATCH] rgxinit.c: cast boolean value to IMG_BOOL
Fixes this error with GCC 11:
| .../services/server/devices/rogue/rgxinit.c:1345:36: error: implicit conversion from 'enum <anonymous>' to 'IMG_BOOL' {aka 'enum tag_img_bool'} [-Werror=enum-conversion]
| 1345 | bEnableAPM = false;
| | ^
Upstream-Status: Pending
Signed-off-by: Denys Dmytriyenko <denys@konsulko.com>
---
services/server/devices/rogue/rgxinit.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/services/server/devices/rogue/rgxinit.c b/services/server/devices/rogue/rgxinit.c
index ca7a1b9..fc94b73 100644
--- a/services/server/devices/rogue/rgxinit.c
+++ b/services/server/devices/rogue/rgxinit.c
@@ -1342,7 +1342,7 @@ PVRSRV_ERROR RGXInitDevPart2(PVRSRV_DEVICE_NODE *psDeviceNode,
if (bEnableAPM && (!PVRSRV_VZ_MODE_IS(NATIVE)))
{
PVR_DPF((PVR_DBG_WARNING, "%s: Active Power Management disabled in virtualization mode", __func__));
- bEnableAPM = false;
+ bEnableAPM = (IMG_BOOL)false;
}
#if defined(RGX_NUM_OS_SUPPORTED) && (RGX_NUM_OS_SUPPORTED > 1) && defined(SUPPORT_AUTOVZ)
--
2.25.1

View File

@@ -3,43 +3,38 @@ HOMEPAGE = "http://git.ti.com/graphics/ti-img-rogue-driver"
LICENSE = "MIT | GPL-2.0-only"
LIC_FILES_CHKSUM = "file://README;beginline=14;endline=19;md5=0403c7dea01a2b8232261e805325fac2"
inherit module features_check
inherit module
REQUIRED_MACHINE_FEATURES = "gpu"
PROVIDES = "virtual/gpudriver"
MACHINE_KERNEL_PR:append = "b"
PR = "${MACHINE_KERNEL_PR}"
PACKAGE_ARCH = "${MACHINE_ARCH}"
COMPATIBLE_MACHINE = "j721e|j721s2|am62xx"
COMPATIBLE_MACHINE = "j721e|j721s2|j784s4|am62xx"
DEPENDS = "virtual/kernel"
PROVIDES = "virtual/gpudriver"
BRANCH = "linuxws/kirkstone/k6.1/${PV}"
BRANCH = "linuxws/dunfell/k5.10/${PV}_unified_fw_pagesize"
SRC_URI = " \
git://git.ti.com/graphics/ti-img-rogue-driver.git;branch=${BRANCH} \
file://0001-compiler-support-OpenEmbedded-nodistro-internal-aarc.patch \
file://0001-rgxinit.c-cast-boolean-value-to-IMG_BOOL.patch \
"
SRC_URI = "git://git.ti.com/git/graphics/ti-img-rogue-driver.git;protocol=https;branch=${BRANCH}"
S = "${WORKDIR}/git"
SRCREV = "6d3d62a15ceb85b719c35f34c6c9e35f556b406b"
SRCREV = "c0adc3c36f4a0b2f590abfe0609b03096d58c648"
TARGET_PRODUCT:j721e = "j721e_linux"
TARGET_PRODUCT:j721s2 = "j721s2_linux"
TARGET_PRODUCT:j784s4 = "j784s4_linux"
TARGET_PRODUCT:am62xx = "am62_linux"
TARGET_BVNC:j721e = "22.104.208.318"
TARGET_BVNC:j721s2 = "36.53.104.796"
TARGET_BVNC:am62xx = "33.15.11.3"
PVR_BUILD = "release"
PVR_WS = "wayland"
PVR_WS = "lws-generic"
EXTRA_OEMAKE += 'KERNELDIR="${STAGING_KERNEL_DIR}" RGX_BVNC=${TARGET_BVNC} BUILD=${PVR_BUILD} PVR_BUILD_DIR=${TARGET_PRODUCT} WINDOW_SYSTEM=${PVR_WS}'
EXTRA_OEMAKE += 'KERNELDIR="${STAGING_KERNEL_DIR}" BUILD=${PVR_BUILD} PVR_BUILD_DIR=${TARGET_PRODUCT} WINDOW_SYSTEM=${PVR_WS}'
do_install() {
make -C ${STAGING_KERNEL_DIR} M=${B}/binary_${TARGET_PRODUCT}_${PVR_WS}_${PVR_BUILD}/target_aarch64/kbuild INSTALL_MOD_PATH=${D}${root_prefix} PREFIX=${STAGING_DIR_HOST} modules_install
}
RRECOMMENDS:${PN} += "ti-img-rogue-umlibs"

View File

@@ -3,11 +3,11 @@ HOMEPAGE = "https://git.ti.com/graphics/omap5-sgx-ddk-linux"
LICENSE = "MIT | GPL-2.0-only"
LIC_FILES_CHKSUM = "file://eurasia_km/README;beginline=13;endline=22;md5=74506d9b8e5edbce66c2747c50fcef12"
inherit module features_check
inherit module
REQUIRED_MACHINE_FEATURES = "gpu"
PROVIDES = "virtual/gpudriver"
COMPATIBLE_MACHINE = "ti33x|ti43x|omap-a15|k3"
COMPATIBLE_MACHINE = "ti33x|ti43x|omap-a15|am65xx"
MACHINE_KERNEL_PR:append = "x"
PR = "${MACHINE_KERNEL_PR}"
@@ -16,11 +16,9 @@ PACKAGE_ARCH = "${MACHINE_ARCH}"
DEPENDS = "virtual/kernel"
PROVIDES = "virtual/gpudriver"
BRANCH = "ti-img-sgx/${PV}/k5.10"
SRC_URI = "git://git.ti.com/graphics/omap5-sgx-ddk-linux.git;protocol=git;branch=${BRANCH}"
SRC_URI = "git://git.ti.com/git/graphics/omap5-sgx-ddk-linux.git;protocol=https;branch=${BRANCH}"
S = "${WORKDIR}/git"
@@ -29,18 +27,22 @@ SRCREV = "eda7780bfd5277e16913c9bc0b0e6892b4e79063"
TARGET_PRODUCT:omap-a15 = "jacinto6evm"
TARGET_PRODUCT:ti33x = "ti335x"
TARGET_PRODUCT:ti43x = "ti437x"
TARGET_PRODUCT:k3 = "ti654x"
TARGET_PRODUCT:am65xx = "ti654x"
PVR_BUILD = "release"
PVR_WS = "nulldrmws"
EXTRA_OEMAKE += 'KERNELDIR="${STAGING_KERNEL_DIR}" TARGET_PRODUCT=${TARGET_PRODUCT} WINDOW_SYSTEM=nulldrmws'
EXTRA_OEMAKE += 'KERNELDIR="${STAGING_KERNEL_DIR}" BUILD=${PVR_BUILD} TARGET_PRODUCT=${TARGET_PRODUCT} WINDOW_SYSTEM=${PVR_WS}'
do_compile:prepend() {
cd ${S}/eurasia_km/eurasiacon/build/linux2/omap_linux
}
do_install() {
make -C ${STAGING_KERNEL_DIR} M=${B}/eurasia_km/eurasiacon/binary_omap_linux_nulldrmws_release/target_armhf/kbuild INSTALL_MOD_PATH=${D}${root_prefix} PREFIX=${STAGING_DIR_HOST} modules_install
make -C ${STAGING_KERNEL_DIR} M=${B}/eurasia_km/eurasiacon/binary_omap_linux_${PVR_WS}_${PVR_BUILD}/target_armhf/kbuild INSTALL_MOD_PATH=${D}${root_prefix} PREFIX=${STAGING_DIR_HOST} modules_install
}
do_install:k3() {
make -C ${STAGING_KERNEL_DIR} M=${B}/eurasia_km/eurasiacon/binary_omap_linux_nulldrmws_release/target_aarch64/kbuild INSTALL_MOD_PATH=${D}${root_prefix} PREFIX=${STAGING_DIR_HOST} modules_install
do_install:am65xx() {
make -C ${STAGING_KERNEL_DIR} M=${B}/eurasia_km/eurasiacon/binary_omap_linux_${PVR_WS}_${PVR_BUILD}/target_aarch64/kbuild INSTALL_MOD_PATH=${D}${root_prefix} PREFIX=${STAGING_DIR_HOST} modules_install
}
RRECOMMENDS:${PN} += "ti-sgx-ddk-um"

View File

@@ -6,7 +6,7 @@ PR = "${INC_PR}.0"
CLEANBROKEN = "1"
COMPATIBLE_MACHINE = "ti33x|ti43x|am57xx-evm|am57xx-hs-evm"
COMPATIBLE_MACHINE = "ti33x|ti43x|am57xx"
PACKAGE_ARCH = "${MACHINE_ARCH}"
@@ -15,8 +15,7 @@ S = "${WORKDIR}/git"
TARGET = ""
TARGET:ti33x = "am335x-pru0-prueth-fw.elf am335x-pru1-prueth-fw.elf"
TARGET:ti43x = "am437x-pru0-prueth-fw.elf am437x-pru1-prueth-fw.elf"
TARGET:am57xx-evm = "am57xx-pru0-prueth-fw.elf am57xx-pru1-prueth-fw.elf"
TARGET:am57xx-hs-evm = "am57xx-pru0-prueth-fw.elf am57xx-pru1-prueth-fw.elf"
TARGET:am57xx = "am57xx-pru0-prueth-fw.elf am57xx-pru1-prueth-fw.elf"
do_install() {
install -d ${D}${nonarch_base_libdir}/firmware/ti-pruss

View File

@@ -0,0 +1,34 @@
SUMMARY = "PRU HSR firmware for AM65xx SR2.0"
require recipes-bsp/ti-linux-fw/ti-linux-fw.inc
PV = "${PRUETH_FW_AM65X_SR2_VERSION}"
PR = "${INC_PR}.0"
CLEANBROKEN = "1"
COMPATIBLE_MACHINE = "am65xx-evm|am64xx"
PACKAGE_ARCH = "${MACHINE_ARCH}"
S = "${WORKDIR}/git"
TARGET = " \
am65x-sr2-pru0-pruhsr-fw.elf \
am65x-sr2-pru1-pruhsr-fw.elf \
am65x-sr2-rtu0-pruhsr-fw.elf \
am65x-sr2-rtu1-pruhsr-fw.elf \
am65x-sr2-txpru0-pruhsr-fw.elf \
am65x-sr2-txpru1-pruhsr-fw.elf \
"
do_install() {
install -d ${D}${nonarch_base_libdir}/firmware/ti-pruss
for f in ${TARGET}; do
install -m 0644 ${S}/ti-pruss/$f ${D}${nonarch_base_libdir}/firmware/ti-pruss/$f
done
}
FILES:${PN} = "${nonarch_base_libdir}/firmware"
INSANE_SKIP:${PN} = "arch"

View File

@@ -7,7 +7,7 @@ PR = "${INC_PR}.0"
CLEANBROKEN = "1"
COMPATIBLE_MACHINE = "ti33x|ti43x|am57xx-evm|am57xx-hs-evm"
COMPATIBLE_MACHINE = "ti33x|ti43x|am57xx"
PACKAGE_ARCH = "${MACHINE_ARCH}"
@@ -16,8 +16,7 @@ S = "${WORKDIR}/git"
TARGET = ""
TARGET:ti33x = "am335x-pru0-pruhsr-fw.elf am335x-pru1-pruhsr-fw.elf"
TARGET:ti43x = "am437x-pru0-pruhsr-fw.elf am437x-pru1-pruhsr-fw.elf"
TARGET:am57xx-evm = "am57xx-pru0-pruhsr-fw.elf am57xx-pru1-pruhsr-fw.elf"
TARGET:am57xx-hs-evm = "am57xx-pru0-pruhsr-fw.elf am57xx-pru1-pruhsr-fw.elf"
TARGET:am57xx = "am57xx-pru0-pruhsr-fw.elf am57xx-pru1-pruhsr-fw.elf"
do_install() {
install -d ${D}${nonarch_base_libdir}/firmware/ti-pruss

View File

@@ -7,7 +7,7 @@ PR = "${INC_PR}.0"
CLEANBROKEN = "1"
COMPATIBLE_MACHINE = "ti33x|ti43x|am57xx-evm|am57xx-hs-evm"
COMPATIBLE_MACHINE = "ti33x|ti43x|am57xx"
PACKAGE_ARCH = "${MACHINE_ARCH}"
@@ -16,9 +16,7 @@ S = "${WORKDIR}/git"
TARGET = ""
TARGET:ti33x = "am335x-pru0-pruprp-fw.elf am335x-pru1-pruprp-fw.elf"
TARGET:ti43x = "am437x-pru0-pruprp-fw.elf am437x-pru1-pruprp-fw.elf"
TARGET:am57xx-evm = "am57xx-pru0-pruprp-fw.elf am57xx-pru1-pruprp-fw.elf"
TARGET:am57xx-hs-evm = "am57xx-pru0-pruprp-fw.elf am57xx-pru1-pruprp-fw.elf"
TARGET:am57xx = "am57xx-pru0-pruprp-fw.elf am57xx-pru1-pruprp-fw.elf"
do_install() {
install -d ${D}${nonarch_base_libdir}/firmware/ti-pruss

View File

@@ -7,7 +7,7 @@ PR = "${INC_PR}.0"
CLEANBROKEN = "1"
COMPATIBLE_MACHINE = "am65xx-evm"
COMPATIBLE_MACHINE = "am65xx-evm|am64xx"
PACKAGE_ARCH = "${MACHINE_ARCH}"

View File

@@ -6,7 +6,7 @@ PR = "${INC_PR}.0"
CLEANBROKEN = "1"
COMPATIBLE_MACHINE = "ti33x|ti43x|am57xx-evm|am57xx-hs-evm"
COMPATIBLE_MACHINE = "ti33x|ti43x|am57xx"
PACKAGE_ARCH = "${MACHINE_ARCH}"
@@ -15,8 +15,7 @@ S = "${WORKDIR}/git"
TARGET = ""
TARGET:ti33x = "am335x-pru0-prusw-fw.elf am335x-pru1-prusw-fw.elf"
TARGET:ti43x = "am437x-pru0-prusw-fw.elf am437x-pru1-prusw-fw.elf"
TARGET:am57xx-evm = "am57xx-pru0-prusw-fw.elf am57xx-pru1-prusw-fw.elf"
TARGET:am57xx-hs-evm = "am57xx-pru0-prusw-fw.elf am57xx-pru1-prusw-fw.elf"
TARGET:am57xx = "am57xx-pru0-prusw-fw.elf am57xx-pru1-prusw-fw.elf"
do_install() {
install -d ${D}${nonarch_base_libdir}/firmware/ti-pruss

View File

@@ -0,0 +1,119 @@
SUMMARY = "TI DM prebuilt binary firmware images"
LICENSE = "TI-TFL"
LIC_FILES_CHKSUM = "file://${COREBASE}/../meta-ti/licenses/TI-TFL;md5=a1b59cb7ba626b9dbbcbf00f3fbc438a"
COMPATIBLE_MACHINE = "k3"
PACKAGE_ARCH = "${MACHINE_ARCH}"
INHIBIT_DEFAULT_DEPS = "1"
inherit deploy
inherit update-alternatives
require recipes-bsp/ti-linux-fw/ti-linux-fw.inc
PV = "${TI_DM_FW_VERSION}"
PR = "${INC_PR}.0"
CLEANBROKEN = "1"
# Secure Build
inherit ti-secdev
PLAT_SFX = ""
PLAT_SFX:j721e = "j721e"
PLAT_SFX:j7200 = "j7200"
PLAT_SFX:j721s2 = "j721s2"
PLAT_SFX:j784s4 = "j784s4"
PLAT_SFX:am65xx = "am65xx"
PLAT_SFX:am64xx = "am64xx"
PLAT_SFX:am62xx = "am62xx"
PLAT_SFX:am62axx = "am62axx"
DM_FW_DIR = "ti-dm/${PLAT_SFX}"
INSTALL_DM_FW_DIR = "${nonarch_base_libdir}/firmware/${DM_FW_DIR}"
DM_FIRMWARE = "ipc_echo_testb_mcu1_0_release_strip.xer5f"
DM_FW_LIST = ""
DM_FW_LIST:j721e = "${DM_FIRMWARE}"
DM_FW_LIST:j7200 = "${DM_FIRMWARE}"
DM_FW_LIST:j721s2 = "${DM_FIRMWARE}"
DM_FW_LIST:j784s4 = "${DM_FIRMWARE}"
DM_FW_LIST:am65xx = ""
DM_FW_LIST:am64xx = ""
DM_FW_LIST:am62xx = "${DM_FIRMWARE}"
DM_FW_LIST:am62axx = "${DM_FIRMWARE}"
do_install() {
# Sign the firmware
# DM Firmware
for FW_NAME in ${DM_FW_LIST}
do
${TI_SECURE_DEV_PKG}/scripts/secure-binary-image.sh ${S}/${DM_FW_DIR}/${FW_NAME} ${S}/${DM_FW_DIR}/${FW_NAME}.signed
done
# DM Firmware
install -d ${D}${INSTALL_DM_FW_DIR}
for FW_NAME in ${DM_FW_LIST}
do
install -m 0644 ${S}/${DM_FW_DIR}/${FW_NAME} ${D}${INSTALL_DM_FW_DIR}/
install -m 0644 ${S}/${DM_FW_DIR}/${FW_NAME}.signed ${D}${INSTALL_DM_FW_DIR}/
done
}
do_deploy() {
# DM Firmware is needed for rebuilding U-Boot
install -d ${DEPLOYDIR}
for FW_NAME in ${DM_FW_LIST}
do
install -m 0644 ${S}/${DM_FW_DIR}/${FW_NAME} ${DEPLOYDIR}/
install -m 0644 ${S}/${DM_FW_DIR}/${FW_NAME}.signed ${DEPLOYDIR}/
done
}
# Set up names for the firmwares
ALTERNATIVE:${PN}:am62xx = "am62-main-r5f0_0-fw"
ALTERNATIVE:${PN}:am62axx = "am62a-main-r5f0_0-fw"
ALTERNATIVE:${PN}:j721e = "j7-mcu-r5f0_0-fw"
ALTERNATIVE:${PN}:j7200 = "j7200-mcu-r5f0_0-fw"
ALTERNATIVE:${PN}:j721s2 = "j721s2-mcu-r5f0_0-fw"
ALTERNATIVE:${PN}:j784s4 = "j784s4-mcu-r5f0_0-fw"
# Set up link names for the firmwares
ALTERNATIVE_LINK_NAME[am62-main-r5f0_0-fw] = "${nonarch_base_libdir}/firmware/am62-main-r5f0_0-fw"
ALTERNATIVE_LINK_NAME[am62a-main-r5f0_0-fw] = "${nonarch_base_libdir}/firmware/am62a-main-r5f0_0-fw"
ALTERNATIVE_LINK_NAME[j7-mcu-r5f0_0-fw] = "${nonarch_base_libdir}/firmware/j7-mcu-r5f0_0-fw"
ALTERNATIVE_LINK_NAME[j7200-mcu-r5f0_0-fw] = "${nonarch_base_libdir}/firmware/j7200-mcu-r5f0_0-fw"
ALTERNATIVE_LINK_NAME[j721s2-mcu-r5f0_0-fw] = "${nonarch_base_libdir}/firmware/j721s2-mcu-r5f0_0-fw"
ALTERNATIVE_LINK_NAME[j784s4-mcu-r5f0_0-fw] = "${nonarch_base_libdir}/firmware/j784s4-mcu-r5f0_0-fw"
# Create the firmware alternatives
ALTERNATIVE_TARGET[am62-main-r5f0_0-fw] = "${INSTALL_DM_FW_DIR}/${DM_FIRMWARE}"
ALTERNATIVE_TARGET[am62a-main-r5f0_0-fw] = "${INSTALL_DM_FW_DIR}/${DM_FIRMWARE}"
ALTERNATIVE_TARGET[j7-mcu-r5f0_0-fw] = "${INSTALL_DM_FW_DIR}/${DM_FIRMWARE}"
ALTERNATIVE_TARGET[j7200-mcu-r5f0_0-fw] = "${INSTALL_DM_FW_DIR}/${DM_FIRMWARE}"
ALTERNATIVE_TARGET[j721s2-mcu-r5f0_0-fw] = "${INSTALL_DM_FW_DIR}/${DM_FIRMWARE}"
ALTERNATIVE_TARGET[j784s4-mcu-r5f0_0-fw] = "${INSTALL_DM_FW_DIR}/${DM_FIRMWARE}"
ALTERNATIVE_PRIORITY = "10"
# make sure that lib/firmware, and all its contents are part of the package
FILES:${PN} += "${nonarch_base_libdir}/firmware"
# This is used to prevent the build system to_strip the executables
INHIBIT_PACKAGE_STRIP = "1"
INHIBIT_SYSROOT_STRIP = "1"
# This is used to prevent the build system to split the debug info in a separate file
INHIBIT_PACKAGE_DEBUG_SPLIT = "1"
# As it likely to be a different arch from the Yocto build, disable checking by adding "arch" to INSANE_SKIP
INSANE_SKIP:${PN} += "arch"
# we don't want to configure and build the source code
do_compile[noexec] = "1"
do_configure[noexec] = "1"
addtask deploy after do_install

View File

@@ -0,0 +1,118 @@
SUMMARY = "TI Ethernet prebuilt binary firmware images"
LICENSE = "TI-TFL"
LIC_FILES_CHKSUM = "file://${COREBASE}/../meta-ti/licenses/TI-TFL;md5=a1b59cb7ba626b9dbbcbf00f3fbc438a"
COMPATIBLE_MACHINE = "k3"
PACKAGE_ARCH = "${MACHINE_ARCH}"
INHIBIT_DEFAULT_DEPS = "1"
inherit deploy
inherit update-alternatives
require recipes-bsp/ti-linux-fw/ti-linux-fw.inc
PV = "${CORESDK_RTOS_VERSION}"
PR = "${INC_PR}.0"
CLEANBROKEN = "1"
# Secure Build
inherit ti-secdev
PLAT_SFX = ""
PLAT_SFX:j721e = "j721e"
PLAT_SFX:j7200 = "j7200"
PLAT_SFX:j721s2 = "j721s2"
PLAT_SFX:j784s4 = "j784s4"
PLAT_SFX:am65xx = "am65xx"
PLAT_SFX:am64xx = "am64xx"
PLAT_SFX:am62xx = "am62xx"
PLAT_SFX:am62axx = "am62axx"
ETH_FW_DIR = "ti-eth/${PLAT_SFX}"
INSTALL_ETH_FW_DIR = "${nonarch_base_libdir}/firmware/${ETH_FW_DIR}"
ETH_FW = "app_remoteswitchcfg_server_strip.xer5f"
ETH_FW_LIST = ""
ETH_FW_LIST:j721e = "${ETH_FW}"
ETH_FW_LIST:j7200 = "${ETH_FW}"
ETH_FW_LIST:j721s2 = ""
ETH_FW_LIST:j784s4 = "${ETH_FW}"
ETH_FW_LIST:am65xx = ""
ETH_FW_LIST:am64xx = ""
ETH_FW_LIST:am62xx = ""
ETH_FW_LIST:am62axx = ""
do_install() {
# ETH firmware
for FW_NAME in ${ETH_FW_LIST}
do
${TI_SECURE_DEV_PKG}/scripts/secure-binary-image.sh ${S}/${ETH_FW_DIR}/${FW_NAME} ${S}/${ETH_FW_DIR}/${FW_NAME}.signed
done
# ETH firmware
install -d ${D}${INSTALL_ETH_FW_DIR}
for FW_NAME in ${ETH_FW_LIST}
do
install -m 0644 ${S}/${ETH_FW_DIR}/${FW_NAME} ${D}${INSTALL_ETH_FW_DIR}
install -m 0644 ${S}/${ETH_FW_DIR}/${FW_NAME}.signed ${D}${INSTALL_ETH_FW_DIR}
done
}
# Set up names for the firmwares
ALTERNATIVE:${PN}:j721e = "\
j7-main-r5f0_0-fw \
j7-main-r5f0_0-fw-sec \
"
ALTERNATIVE:${PN}:j7200 = "\
j7200-main-r5f0_0-fw \
j7200-main-r5f0_0-fw-sec \
"
ALTERNATIVE:${PN}:j784s4 = "\
j784s4-mcu-r5f0_0-fw \
j784s4-mcu-r5f0_0-fw-sec \
"
# Set up link names for the firmwares
ALTERNATIVE_LINK_NAME[j7-main-r5f0_0-fw] = "${nonarch_base_libdir}/firmware/j7-main-r5f0_0-fw"
ALTERNATIVE_LINK_NAME[j7-main-r5f0_0-fw-sec] = "${nonarch_base_libdir}/firmware/j7-main-r5f0_0-fw-sec"
ALTERNATIVE_LINK_NAME[j7200-main-r5f0_0-fw] = "${nonarch_base_libdir}/firmware/j7200-main-r5f0_0-fw"
ALTERNATIVE_LINK_NAME[j7200-main-r5f0_0-fw-sec] = "${nonarch_base_libdir}/firmware/j7200-main-r5f0_0-fw-sec"
ALTERNATIVE_LINK_NAME[j784s4-mcu-r5f0_0-fw] = "${nonarch_base_libdir}/firmware/j784s4-mcu-r5f0_0-fw"
ALTERNATIVE_LINK_NAME[j784s4-mcu-r5f0_0-fw-sec] = "${nonarch_base_libdir}/firmware/j784s4-mcu-r5f0_0-fw-sec"
# Create the firmware alternatives
ALTERNATIVE_TARGET[j7-main-r5f0_0-fw] = "${INSTALL_ETH_FW_DIR}/${ETH_FW}"
ALTERNATIVE_TARGET[j7-main-r5f0_0-fw-sec] = "${INSTALL_ETH_FW_DIR}/${ETH_FW}.signed"
ALTERNATIVE_TARGET[j7200-main-r5f0_0-fw] = "${INSTALL_ETH_FW_DIR}/${ETH_FW}"
ALTERNATIVE_TARGET[j7200-main-r5f0_0-fw-sec] = "${INSTALL_ETH_FW_DIR}/${ETH_FW}.signed"
ALTERNATIVE_TARGET[j784s4-mcu-r5f0_0-fw] = "${INSTALL_ETH_FW_DIR}/${ETH_FW}"
ALTERNATIVE_TARGET[j784s4-mcu-r5f0_0-fw-sec] = "${INSTALL_ETH_FW_DIR}/${ETH_FW}.signed"
ALTERNATIVE_PRIORITY = "20"
# make sure that lib/firmware, and all its contents are part of the package
FILES:${PN} += "${nonarch_base_libdir}/firmware"
# This is used to prevent the build system to_strip the executables
INHIBIT_PACKAGE_STRIP = "1"
INHIBIT_SYSROOT_STRIP = "1"
# This is used to prevent the build system to split the debug info in a separate file
INHIBIT_PACKAGE_DEBUG_SPLIT = "1"
# As it likely to be a different arch from the Yocto build, disable checking by adding "arch" to INSANE_SKIP
INSANE_SKIP:${PN} += "arch"
# we don't want to configure and build the source code
do_compile[noexec] = "1"
do_configure[noexec] = "1"

View File

@@ -15,6 +15,6 @@ EXTRA_OEMAKE = "CC="${CC}""
TARGET_CC_ARCH += "${LDFLAGS}"
BRANCH = "master"
SRC_URI = "git://git.ti.com/jacinto7_multimedia/viddec-test-app.git;protocol=git;branch=${BRANCH}"
SRC_URI = "git://git.ti.com/git/jacinto7_multimedia/viddec-test-app.git;protocol=https;branch=${BRANCH}"
S = "${WORKDIR}/git"

View File

@@ -15,6 +15,6 @@ EXTRA_OEMAKE = "CC="${CC}""
TARGET_CC_ARCH += "${LDFLAGS}"
BRANCH = "master"
SRC_URI = "git://git.ti.com/jacinto7_multimedia/videnc-test-app.git;protocol=git;branch=${BRANCH}"
SRC_URI = "git://git.ti.com/git/jacinto7_multimedia/videnc-test-app.git;protocol=https;branch=${BRANCH}"
S = "${WORKDIR}/git"

View File

@@ -9,7 +9,7 @@ PR = "${INC_PR}.0"
CLEANBROKEN = "1"
COMPATIBLE_MACHINE = "j7"
COMPATIBLE_MACHINE = "j721e"
PACKAGE_ARCH = "${MACHINE_ARCH}"

View File

@@ -1,39 +1,27 @@
SUMMARY = "TI SCI firmware (SYSFW)"
SUMMARY = "Common include for TI Linux firmware"
LICENSE = "TI-TFL"
LIC_FILES_CHKSUM = "file://LICENSE.ti;md5=b5aebf0668bdf95621259288c4a46d76"
PV = "2022.01"
INC_PR = "r3"
INC_PR = "r4"
# Firmware versions
CORESDK_RTOS_VERSION = "08.02.00.04"
SERDES_FW_VERSION = "3.3.0.2c"
NETCP_SA_FW_VERSION = "1.0.0"
NETCP_PA_FW_VERSION = "3.0.2.3"
QMSS_PDSP_FW_VERSION = "1.0.0.9"
PRUETH_FW_AM65X_VERSION = "08.00.00.20"
PRUETH_FW_AM65X_SR2_VERSION = "02.02.09.07"
PRUETH_FW_AM65X_SR2_VERSION = "02.02.11.02"
GOODIX_FW_VERSION = "1.0.0.0"
CADENCE_MHDP_FW_VERSION = "1.2.17"
CADENCE_MHDP_FW_VERSION = "2.1.0"
IMG_DEC_FW_VERSION = "1.0"
CNM_WAVE521_FW_VERSION = "1.0.00"
TIFS_LPM_STUB_FW_VERSION = "08.03.02"
TI_DM_FW_VERSION = "08.06.04"
TI_SYSFW_VERSION = "08.06.04"
TI_LINUX_FW_SRCREV ?= "5f34a3a9bd5a9c93974ffec41da81b916f794efc"
TI_LINUX_FW_SRCREV ?= "905eb58564581d951d148f45828e8c8a142a5938"
SRCREV = "${TI_LINUX_FW_SRCREV}"
BRANCH ?= "ti-linux-firmware"
K3_IMAGE_GEN_SRCREV ?= "85a70059fc24242ea03653a5014b98100e4da2d6"
SRCREV_imggen = "${K3_IMAGE_GEN_SRCREV}"
SRCREV_FORMAT = "imggen"
K3_IMAGE_GEN_BRANCH ?= "master"
SRC_URI = " \
git://git.ti.com/processor-firmware/ti-linux-firmware.git;protocol=git;branch=${BRANCH} \
git://git.ti.com/k3-image-gen/k3-image-gen.git;protocol=git;branch=${K3_IMAGE_GEN_BRANCH};destsuffix=imggen;name=imggen \
"
SRC_URI = "git://git.ti.com/git/processor-firmware/ti-linux-firmware.git;protocol=https;branch=${BRANCH}"
S = "${WORKDIR}/git"

View File

@@ -1,45 +0,0 @@
# ti-sci-fw builds and packages multiple config variants via multiconfig
# Let's take a page from gcc-source as a common recipe for all gcc stages,
# but also to provide a single package for MAINMACHINE of all multiconfigs
require recipes-bsp/ti-linux-fw/ti-linux-fw.inc
SUMMARY += "- sources"
COMPATIBLE_MACHINE = "k3"
EXCLUDE_FROM_WORLD = "1"
INHIBIT_DEFAULT_DEPS = "1"
DEPENDS = ""
PACKAGES = "${PN}"
PACKAGE_ARCH = "${MACHINE_ARCH}"
do_configure[noexec] = "1"
do_compile[noexec] = "1"
SRCIPK_SRC_DIR = "${WORKDIR}/imggen"
SRCIPK_INSTALL_DIR = "board-support/k3-image-gen-${PV}"
FILES:${PN} = "${SRCIPK_INSTALL_DIR}"
do_install() {
# Copy sources for packaging
mkdir -p ${D}/${SRCIPK_INSTALL_DIR}
if [ -e ${SRCIPK_SRC_DIR} ]; then
if [ "${SRCIPK_SRC_DIR}" = "${WORKDIR}" ]; then
excludes='--exclude ./temp --exclude ${D}'
fi
tar -C ${SRCIPK_SRC_DIR} -cO $excludes . | tar -C ${D}/${SRCIPK_INSTALL_DIR} -xpf -
fi
# Fix up patches/ directory to contain actual patches instead of symlinks
if [ -e ${D}/${SRCIPK_INSTALL_DIR}/patches ]
then
mv ${D}/${SRCIPK_INSTALL_DIR}/patches ${D}/${SRCIPK_INSTALL_DIR}/patches-links
cp -rL ${D}/${SRCIPK_INSTALL_DIR}/patches-links ${D}/${SRCIPK_INSTALL_DIR}/patches
rm -rf ${D}/${SRCIPK_INSTALL_DIR}/patches-links
fi
}
# Do not perform any QA checks on source package
INSANE_SKIP:${PN} += "${ALL_QA}"

View File

@@ -1,209 +1,24 @@
SUMMARY = "TI SYSFW/TIFS Firmware"
require recipes-bsp/ti-linux-fw/ti-linux-fw.inc
DEPENDS = "openssl-native u-boot-mkimage-native dtc-native"
DEPENDS:append:j7200-evm-k3r5 = " virtual/bootloader"
DEPENDS:append:j7200-hs-evm-k3r5 = " virtual/bootloader"
DEPENDS:append:j721s2-evm-k3r5 = " virtual/bootloader"
DEPENDS:append:j721s2-hs-evm-k3r5 = " virtual/bootloader"
DEPENDS:append:am64xx-evm-k3r5 = " virtual/bootloader"
DEPENDS:append:am64xx-hs-evm-k3r5 = " virtual/bootloader"
DEPENDS:append:am62xx-evm-k3r5 = " virtual/bootloader"
CLEANBROKEN = "1"
PR = "${INC_PR}.2"
# Loaded by R5F core
COMPATIBLE_MACHINE = "k3r5"
COMPATIBLE_MACHINE:aarch64 = "null"
PACKAGE_ARCH = "${MACHINE_ARCH}"
TI_SECURE_DEV_PKG ?= ""
export TI_SECURE_DEV_PKG
SYSFW_SOC ?= "unknown"
SYSFW_CONFIG ?= "unknown"
SYSFW_PREFIX = "ti-sci-firmware"
SYSFW_PREFIX:j721e-evm-k3r5 = "ti-fs-firmware"
SYSFW_PREFIX:j721e-hs-evm-k3r5 = "ti-fs-firmware"
SYSFW_PREFIX:j721e-hs-evm-k3r5-sr1-1 = "ti-fs-firmware"
SYSFW_PREFIX:j7200-evm-k3r5 = "ti-fs-firmware"
SYSFW_PREFIX:j7200-hs-evm-k3r5 = "ti-fs-firmware"
SYSFW_PREFIX:j721s2-evm-k3r5 = "ti-fs-firmware"
SYSFW_PREFIX:j721s2-hs-evm-k3r5 = "ti-fs-firmware"
SYSFW_PREFIX:am62xx-evm-k3r5 = "ti-fs-firmware"
SYSFW_SUFFIX ?= "unknown"
SYSFW_BASE = "${SYSFW_PREFIX}-${SYSFW_SOC}-${SYSFW_SUFFIX}"
SYSFW_BASE:append = "${@['','*']['${SYSFW_SUFFIX}' == 'hs']}"
SYSFW_TISCI = "${S}/ti-sysfw/${SYSFW_BASE}.bin"
SYSFW_BINARY = "sysfw-${SYSFW_SOC}-${SYSFW_CONFIG}.itb"
SYSFW_VBINARY = "sysfw-${PV}-${SYSFW_SOC}-${SYSFW_CONFIG}.itb"
SYSFW_IMAGE = "sysfw-${SYSFW_SOC}-${SYSFW_CONFIG}.itb"
SYSFW_SYMLINK ?= "sysfw.itb"
CFLAGS[unexport] = "1"
LDFLAGS[unexport] = "1"
AS[unexport] = "1"
LD[unexport] = "1"
do_configure[noexec] = "1"
PV = "${TI_SYSFW_VERSION}"
PR = "${INC_PR}.0"
EXTRA_OEMAKE = "\
CROSS_COMPILE=${TARGET_PREFIX} SYSFW_DL_URL='' SYSFW_HS_DL_URL='' SYSFW_HS_INNER_CERT_DL_URL='' \
SYSFW_PATH="${SYSFW_TISCI}" SOC=${SYSFW_SOC} CONFIG=${SYSFW_CONFIG} \
"
EXTRA_OEMAKE_HS = " \
HS=1 SW_REV=1 SYSFW_HS_PATH="${S}/ti-sysfw/${SYSFW_BASE}-enc.bin" SYSFW_HS_INNER_CERT_PATH="${S}/ti-sysfw/${SYSFW_BASE}-cert.bin" \
"
EXTRA_OEMAKE:append = "${@['',' ${EXTRA_OEMAKE_HS}']['${SYSFW_SUFFIX}' == 'hs']}"
EXTRA_OEMAKE:append:j7200-evm-k3r5 = " SBL="${STAGING_DIR_HOST}/boot/u-boot-spl.bin""
EXTRA_OEMAKE:append:j7200-hs-evm-k3r5 = " SBL="${STAGING_DIR_HOST}/boot/u-boot-spl.bin""
EXTRA_OEMAKE:append:j721s2-evm-k3r5 = " SBL="${STAGING_DIR_HOST}/boot/u-boot-spl.bin""
EXTRA_OEMAKE:append:j721s2-hs-evm-k3r5 = " SBL="${STAGING_DIR_HOST}/boot/u-boot-spl.bin""
EXTRA_OEMAKE:append:am64xx-evm-k3r5 = " SBL="${STAGING_DIR_HOST}/boot/u-boot-spl.bin""
EXTRA_OEMAKE:append:am64xx-hs-evm-k3r5 = " SBL="${STAGING_DIR_HOST}/boot/u-boot-spl.bin""
EXTRA_OEMAKE:append:am62xx-evm-k3r5 = " SBL="${STAGING_DIR_HOST}/boot/u-boot-spl.bin""
do_compile() {
cd ${WORKDIR}/imggen/
oe_runmake
}
CLEANBROKEN = "1"
do_install() {
install -d ${D}/boot
install -m 644 ${WORKDIR}/imggen/${SYSFW_BINARY} ${D}/boot/${SYSFW_VBINARY}
ln -sf ${SYSFW_VBINARY} ${D}/boot/${SYSFW_IMAGE}
if [ ! -z "${SYSFW_SYMLINK}" ]; then
ln -sf ${SYSFW_VBINARY} ${D}/boot/${SYSFW_SYMLINK}
fi
install -d ${D}${nonarch_base_libdir}/firmware/ti-sysfw
install -m 644 ${S}/ti-sysfw/ti-sci-firmware-* ${D}${nonarch_base_libdir}/firmware/ti-sysfw
install -m 644 ${S}/ti-sysfw/ti-fs-firmware-* ${D}${nonarch_base_libdir}/firmware/ti-sysfw
install -m 644 ${S}/ti-sysfw/ti-fs-stub-firmware-* ${D}${nonarch_base_libdir}/firmware/ti-sysfw
}
FILES:${PN} = "/boot"
inherit deploy
do_deploy () {
install -d ${DEPLOYDIR}
install -m 644 ${WORKDIR}/imggen/${SYSFW_BINARY} ${DEPLOYDIR}/${SYSFW_VBINARY}
rm -f ${DEPLOYDIR}/${SYSFW_IMAGE}
ln -sf ${SYSFW_VBINARY} ${DEPLOYDIR}/${SYSFW_IMAGE}
if [ ! -z "${SYSFW_SYMLINK}" ]; then
rm -f ${DEPLOYDIR}/${SYSFW_SYMLINK}
ln -sf ${SYSFW_VBINARY} ${DEPLOYDIR}/${SYSFW_SYMLINK}
fi
install -m 644 ${SYSFW_TISCI} ${DEPLOYDIR}/
}
do_install:j7200-evm-k3r5() {
install -d ${D}/boot
install -m 644 ${WORKDIR}/imggen/${UBOOT_BINARY} ${D}/boot/${UBOOT_IMAGE}
ln -sf ${UBOOT_IMAGE} ${D}/boot/${UBOOT_SYMLINK}
ln -sf ${UBOOT_IMAGE} ${D}/boot/${UBOOT_BINARY}
}
do_deploy:j7200-evm-k3r5() {
install -d ${DEPLOYDIR}
install -m 644 ${WORKDIR}/imggen/${UBOOT_BINARY} ${DEPLOYDIR}/${UBOOT_IMAGE}
ln -sf ${UBOOT_IMAGE} ${DEPLOYDIR}/${UBOOT_SYMLINK}
ln -sf ${UBOOT_IMAGE} ${DEPLOYDIR}/${UBOOT_BINARY}
install -m 644 ${SYSFW_TISCI} ${DEPLOYDIR}/
}
do_install:j7200-hs-evm-k3r5() {
install -d ${D}/boot
install -m 644 ${WORKDIR}/imggen/${UBOOT_BINARY} ${D}/boot/${UBOOT_IMAGE}
ln -sf ${UBOOT_IMAGE} ${D}/boot/${UBOOT_SYMLINK}
ln -sf ${UBOOT_IMAGE} ${D}/boot/${UBOOT_BINARY}
}
do_deploy:j7200-hs-evm-k3r5() {
install -d ${DEPLOYDIR}
install -m 644 ${WORKDIR}/imggen/${UBOOT_BINARY} ${DEPLOYDIR}/${UBOOT_IMAGE}
ln -sf ${UBOOT_IMAGE} ${DEPLOYDIR}/${UBOOT_SYMLINK}
ln -sf ${UBOOT_IMAGE} ${DEPLOYDIR}/${UBOOT_BINARY}
install -m 644 ${SYSFW_TISCI} ${DEPLOYDIR}/
}
do_install:j721s2-evm-k3r5() {
install -d ${D}/boot
install -m 644 ${WORKDIR}/imggen/${UBOOT_BINARY} ${D}/boot/${UBOOT_IMAGE}
ln -sf ${UBOOT_IMAGE} ${D}/boot/${UBOOT_SYMLINK}
ln -sf ${UBOOT_IMAGE} ${D}/boot/${UBOOT_BINARY}
}
do_deploy:j721s2-evm-k3r5() {
install -d ${DEPLOYDIR}
install -m 644 ${WORKDIR}/imggen/${UBOOT_BINARY} ${DEPLOYDIR}/${UBOOT_IMAGE}
ln -sf ${UBOOT_IMAGE} ${DEPLOYDIR}/${UBOOT_SYMLINK}
ln -sf ${UBOOT_IMAGE} ${DEPLOYDIR}/${UBOOT_BINARY}
install -m 644 ${SYSFW_TISCI} ${DEPLOYDIR}/
}
do_install:j721s2-hs-evm-k3r5() {
install -d ${D}/boot
install -m 644 ${WORKDIR}/imggen/${UBOOT_BINARY} ${D}/boot/${UBOOT_IMAGE}
ln -sf ${UBOOT_IMAGE} ${D}/boot/${UBOOT_SYMLINK}
ln -sf ${UBOOT_IMAGE} ${D}/boot/${UBOOT_BINARY}
}
do_deploy:j721s2-hs-evm-k3r5() {
install -d ${DEPLOYDIR}
install -m 644 ${WORKDIR}/imggen/${UBOOT_BINARY} ${DEPLOYDIR}/${UBOOT_IMAGE}
ln -sf ${UBOOT_IMAGE} ${DEPLOYDIR}/${UBOOT_SYMLINK}
ln -sf ${UBOOT_IMAGE} ${DEPLOYDIR}/${UBOOT_BINARY}
install -m 644 ${SYSFW_TISCI} ${DEPLOYDIR}/
}
do_install:am64xx-evm-k3r5() {
install -d ${D}/boot
install -m 644 ${WORKDIR}/imggen/${UBOOT_BINARY} ${D}/boot/${UBOOT_IMAGE}
ln -sf ${UBOOT_IMAGE} ${D}/boot/${UBOOT_SYMLINK}
ln -sf ${UBOOT_IMAGE} ${D}/boot/${UBOOT_BINARY}
}
do_deploy:am64xx-evm-k3r5() {
install -d ${DEPLOYDIR}
install -m 644 ${WORKDIR}/imggen/${UBOOT_BINARY} ${DEPLOYDIR}/${UBOOT_IMAGE}
ln -sf ${UBOOT_IMAGE} ${DEPLOYDIR}/${UBOOT_SYMLINK}
ln -sf ${UBOOT_IMAGE} ${DEPLOYDIR}/${UBOOT_BINARY}
install -m 644 ${SYSFW_TISCI} ${DEPLOYDIR}/
}
do_install:am64xx-hs-evm-k3r5() {
install -d ${D}/boot
install -m 644 ${WORKDIR}/imggen/${UBOOT_BINARY} ${D}/boot/${UBOOT_IMAGE}
ln -sf ${UBOOT_IMAGE} ${D}/boot/${UBOOT_SYMLINK}
ln -sf ${UBOOT_IMAGE} ${D}/boot/${UBOOT_BINARY}
}
do_deploy:am64xx-hs-evm-k3r5() {
install -d ${DEPLOYDIR}
install -m 644 ${WORKDIR}/imggen/${UBOOT_BINARY} ${DEPLOYDIR}/${UBOOT_IMAGE}
ln -sf ${UBOOT_IMAGE} ${DEPLOYDIR}/${UBOOT_SYMLINK}
ln -sf ${UBOOT_IMAGE} ${DEPLOYDIR}/${UBOOT_BINARY}
install -m 644 ${SYSFW_TISCI} ${DEPLOYDIR}/
}
do_install:am62xx-evm-k3r5() {
install -d ${D}/boot
install -m 644 ${WORKDIR}/imggen/${UBOOT_BINARY} ${D}/boot/${UBOOT_IMAGE}
ln -sf ${UBOOT_IMAGE} ${D}/boot/${UBOOT_SYMLINK}
ln -sf ${UBOOT_IMAGE} ${D}/boot/${UBOOT_BINARY}
}
do_deploy:am62xx-evm-k3r5() {
install -d ${DEPLOYDIR}
install -m 644 ${WORKDIR}/imggen/${UBOOT_BINARY} ${DEPLOYDIR}/${UBOOT_IMAGE}
ln -sf ${UBOOT_IMAGE} ${DEPLOYDIR}/${UBOOT_SYMLINK}
ln -sf ${UBOOT_IMAGE} ${DEPLOYDIR}/${UBOOT_BINARY}
install -m 644 ${SYSFW_TISCI} ${DEPLOYDIR}/
}
addtask deploy before do_build after do_compile
FILES:${PN} = "${nonarch_base_libdir}/firmware"

View File

@@ -1,23 +0,0 @@
SUMMARY = "TI Foundational security Low Power Management Stub"
require recipes-bsp/ti-linux-fw/ti-linux-fw.inc
PV = "${TIFS_LPM_STUB_FW_VERSION}"
PR = "${INC_PR}.0"
CLEANBROKEN = "1"
COMPATIBLE_MACHINE = "am62xx-evm"
PACKAGE_ARCH = "${MACHINE_ARCH}"
S = "${WORKDIR}/git"
TARGET = "ti-fs-stub-firmware-am62x-gp-signed.bin"
do_install() {
install -d ${D}${nonarch_base_libdir}/firmware/ti-sysfw/
install -m 0644 ${S}/ti-sysfw/${TARGET} ${D}${nonarch_base_libdir}/firmware/ti-sysfw/${TARGET}
}
FILES:${PN} = "${nonarch_base_libdir}/firmware"

View File

@@ -0,0 +1,10 @@
PV:k3 = "2.9+git${SRCPV}"
SRCREV_tfa:k3 = "d3e71ead6ea5bc3555ac90a446efec84ef6c6122"
SRC_URI:k3 = "git://git.trustedfirmware.org/TF-A/trusted-firmware-a.git;protocol=https;name=tfa;branch=master"
COMPATIBLE_MACHINE:k3 = "k3"
TFA_BUILD_TARGET:k3 = "all"
TFA_INSTALL_TARGET:k3 = "bl31"
TFA_SPD:k3 = "opteed"
EXTRA_OEMAKE:append:k3 = "${@ ' K3_USART=' + d.getVar('TFA_K3_USART') if d.getVar('TFA_K3_USART') else ''}"
EXTRA_OEMAKE:append:k3 = "${@ ' K3_PM_SYSTEM_SUSPEND=' + d.getVar('TFA_K3_SYSTEM_SUSPEND') if d.getVar('TFA_K3_SYSTEM_SUSPEND') else ''}"

View File

@@ -1,44 +1,4 @@
PV:k3 = "2.6+2.7-rc0"
SRCREV_tfa:k3 = "453abc80b2eacbf2816c838e47e40f063227d934"
SRC_URI:k3 = "git://git.trustedfirmware.org/TF-A/trusted-firmware-a.git;protocol=https;name=tfa;branch=master"
COMPATIBLE_MACHINE:k3 = "k3"
TFA_BUILD_TARGET:k3 = "all"
TFA_INSTALL_TARGET:k3 = "bl31"
TFA_SPD:k3 = "opteed"
TFA_TI = ""
TFA_TI:k3 = "trusted-firmware-a-ti.inc"
EXTRA_OEMAKE:append:k3 = "${@ ' K3_USART=' + d.getVar('TFA_K3_USART') if d.getVar('TFA_K3_USART') else ''}"
EXTRA_OEMAKE:append:k3 = "${@ ' K3_PM_SYSTEM_SUSPEND=' + d.getVar('TFA_K3_SYSTEM_SUSPEND') if d.getVar('TFA_K3_SYSTEM_SUSPEND') else ''}"
# Signing procedure for K3 HS devices
tfa_sign_k3hs() {
export TI_SECURE_DEV_PKG=${TI_SECURE_DEV_PKG}
( cd ${BUILD_DIR}; \
mv bl31.bin bl31.bin.unsigned; \
if [ -f ${TI_SECURE_DEV_PKG}/scripts/secure-binary-image.sh ]; then \
${TI_SECURE_DEV_PKG}/scripts/secure-binary-image.sh bl31.bin.unsigned bl31.bin; \
else \
echo "Warning: TI_SECURE_DEV_PKG not set, TF-A not signed."; \
cp bl31.bin.unsigned bl31.bin; \
fi; \
)
}
do_compile:append:am65xx-hs-evm() {
tfa_sign_k3hs
}
do_compile:append:am64xx-hs-evm() {
tfa_sign_k3hs
}
do_compile:append:j721e-hs-evm() {
tfa_sign_k3hs
}
do_compile:append:j7200-hs-evm() {
tfa_sign_k3hs
}
do_compile:append:j721s2-hs-evm() {
tfa_sign_k3hs
}
require ${TFA_TI}

View File

@@ -0,0 +1,12 @@
# This will have priority over generic uboot path
COMPATIBLE_MACHINE = "am62xx"
BRANCH = "ti-u-boot-2023.04"
BRANCH:tie-jailhouse = "ti-u-boot-2023.04-jailhouse"
SRCREV = "010afc1fe7a1412f92363c8af69c848d76a53e42"
SRCREV:tie-jailhouse = "79615e1c99b9aa73948f811f5f866cff2e34dc37"
UBOOT_GIT_URI = "git://git.ti.com/git/processor-sdk/u-boot.git"

View File

@@ -1,10 +1,10 @@
require u-boot-ti.inc
LIC_FILES_CHKSUM = "file://Licenses/README;md5=5a7450c57ffe5ae63fd732446b988025"
LIC_FILES_CHKSUM = "file://Licenses/README;md5=2ca5f2c35c8cc335f0a19756634782f1"
PR = "r0"
PV = "2021.10"
PV = "2022.10"
# For the un-initiated:
# The actual URL you'd use with a git clone for example would be:
@@ -15,4 +15,4 @@ PV = "2021.10"
# b) and we want git fetcher to use https protocol, hence GIT_PROTOCOL as https
UBOOT_GIT_URI = "git://source.denx.de/u-boot/u-boot.git"
UBOOT_GIT_PROTOCOL = "https"
SRCREV = "d80bb749fab53da72c4a0e09b8c2d2aaa3103c91"
SRCREV = "4debc57a3da6c3f4d3f89a637e99206f4cea0a96"

Some files were not shown because too many files have changed in this diff Show More